Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Anne V. D. M. Kayem
2010 – today
- 2013
[j3]Andrew Adamatzky, Selim G. Akl, Ramón Alonso-Sanz, Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V. D. M. Kayem, Genaro Juárez Martínez, Pedro P. B. de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter M. A. Sloot, Emanuele Strano, Xin-She Yang: Are motorways rational from slime mould's point of view? IJPEDS 28(3): 230-248 (2013)- 2012
[c5]Anne V. D. M. Kayem, Azhar Deshai, Stuart Hammer: On anonymizing social network graphs. ISSA 2012: 1-8
[i1]Andrew Adamatzky, Selim G. Akl, Ramón Alonso-Sanz, Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V. D. M. Kayem, Genaro Juárez Martínez, Pedro P. B. de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter M. A. Sloot, Emanuele Strano, Xin-She Yang: Are motorways rational from slime mould's point of view? CoRR abs/1203.2851 (2012)- 2011
[j2]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl: Enhancing identity trust in cryptographic key management systems for dynamic environments. Security and Communication Networks 4(1): 79-94 (2011)
[c4]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl: Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. ISSA 2011- 2010
[b1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin: Adaptive Cryptographic Access Control. Advances in Information Security 48, Springer 2010, ISBN 978-0-387-77265-3, pp. 1-135
2000 – 2009
- 2008
[j1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin: On replacing cryptographic keys in hierarchical key management systems. Journal of Computer Security 16(3): 289-309 (2008)
[c3]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl, Wendy Powley: A Framework for Self-Protecting Cryptographic Key Management. SASO 2008: 191-200- 2007
[c2]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl: Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. AINA Workshops (1) 2007: 531-536- 2005
[c1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin: An Independent Set Approach to Solving the Collaborative Attack Problem. IASTED PDCS 2005: 594-599
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:01 CEST by the dblp team



