Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Lynette Barnard
2010 – today
- 2013
[c4]Charmain Cilliers, Lynette Barnard, Thomas Hibbers, Melisa Koorsse: MIDD: an architecture for inter-domain mobile content distribution. SAICSIT Conf. 2013: 312-319
[c3]Felix Ntawanga, André P. Calitz, Lynette Barnard: An integrated logical context sensor for mobile web applications. SAICSIT Conf. 2013: 320-330
2000 – 2009
- 2008
[c2]Mathys C. du Plessis, Lynette Barnard: Incorporating layout managers into an evolutionary programming algorithm to design graphical user interfaces. SAICSIT Conf. 2008: 41-47
[c1]Felix Ntawanga, André P. Calitz, Lynette Barnard: Maintaining customer profiles in an e-commerce environment. SAICSIT Conf. 2008: 169-179- 2007
[e1]Lynette Barnard, Reinhardt A. Botha (Eds.): Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2007, Port Elizabeth, South Africa, October 2-3, 2007. ACM International Conference Proceeding Series 226, ACM 2007, ISBN 978-1-59593-775-9- 2005
[j3]Lynette Barnard, Janet Wesson: A trust model for E-commerce in South Africa. South African Computer Journal 35: 10-19 (2005)- 2000
[j2]Lynette Barnard, Rossouw von Solms: A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. Computers & Security 19(2): 185-194 (2000)
1990 – 1999
- 1998
[j1]Lynette Barnard, Rossouw von Solms: The evaluation and certification of information security against BS 7799. Inf. Manag. Comput. Security 6(2): 72-77 (1998)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:23 CEST by the dblp team



