Author of the publication

Using Traffic Analysis to Identify Tor Usage - A Proposed Study.

, , and . Security and Management, page 620-623. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Radio Frequency Identification - A Review of Low Cost Tag Security Proposals.. Australian Computer, Network & Information Forensics Conference, page 1-7. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Using Traffic Analysis to Identify Tor Usage - A Proposed Study., , and . Security and Management, page 620-623. CSREA Press, (2010)Freegate: A Defence against the Pending Censorship of Australia?., and . HAISA, page 133-140. University of Plymouth, (2009)The 2010 IDN Homograph Attack Mitigation Survey., and . Security and Management, page 611-614. CSREA Press, (2010)Radio Frequency Identification: a review of low cost tag security proposals.. Int. J. Inf. Comput. Secur., 1 (4): 391-399 (2007)Computer Security Research: Approaches and Assumptions., and . AISM, page 115-124. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Do No Harm: The Use of RFID Tags in a Medical Environment.. Security and Management, page 399-403. CSREA Press, (2006)Using the Generation One EPC RFID LockID Command as a Method of Directed Attack.. INC, page 213-221. University of Plymouth, (2010)Forensic Data Reocvery on the 8GB Fifth Generation iPod Nano., , and . Security and Management, page 624-626. CSREA Press, (2010)Need to Know: Security or Liability?. AISM, page 125-128. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)