Author of the publication

Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project.

, , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 2-12. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)The security and privacy implications of using social networks to deliver healthcare., and . PETRA, ACM, (2010)The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors., and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 228-246. Springer, (2008)Forgive and forget: return to obscurity., , , , and . NSPW, page 1-10. ACM, (2013)Augmenting Machine Learning with Argumentation., , and . NSPW, page 1-11. ACM, (2018)A case study in testing a network security algorithm.. TRIDENTCOM, page 28. ICST, (2008)Owner-controlled information., and . NSPW, page 103-111. ACM, (2003)Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project., , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 2-12. Springer, (2000)An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce., , , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 116-126. Springer, (2001)A Psychological Profile of Defender Personality Traits., and . J. Comput., 2 (2): 84-93 (2007)