From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Radio Frequency Identification - A Review of Low Cost Tag Security Proposals.. Australian Computer, Network & Information Forensics Conference, стр. 1-7. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Using Traffic Analysis to Identify Tor Usage - A Proposed Study., , и . Security and Management, стр. 620-623. CSREA Press, (2010)Freegate: A Defence against the Pending Censorship of Australia?., и . HAISA, стр. 133-140. University of Plymouth, (2009)The 2010 IDN Homograph Attack Mitigation Survey., и . Security and Management, стр. 611-614. CSREA Press, (2010)Radio Frequency Identification: a review of low cost tag security proposals.. Int. J. Inf. Comput. Secur., 1 (4): 391-399 (2007)Computer Security Research: Approaches and Assumptions., и . AISM, стр. 115-124. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Do No Harm: The Use of RFID Tags in a Medical Environment.. Security and Management, стр. 399-403. CSREA Press, (2006)Using the Generation One EPC RFID LockID Command as a Method of Directed Attack.. INC, стр. 213-221. University of Plymouth, (2010)Need to Know: Security or Liability?. AISM, стр. 125-128. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Forensic Data Reocvery on the 8GB Fifth Generation iPod Nano., , и . Security and Management, стр. 624-626. CSREA Press, (2010)