Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mark Looi
@article{DBLP:journals/jnw/GuoL12, author = {William W. Guo and Mark Looi}, title = {A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks}, journal = {J. Networks}, volume = {7}, number = {10}, pages = {1592--1599}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.10.1592-1599}, doi = {10.4304/JNW.7.10.1592-1599}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanGL11, author = {Xiang Fan and William W. Guo and Mark Looi}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {573--577}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.132}, doi = {10.1109/CIS.2011.132}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FanGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/GohZL10, author = {Vik Tor Goh and Jacob Zimmermann and Mark Looi}, title = {Experimenting with an Intrusion Detection System for Encrypted Networks}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {5}, number = {2}, pages = {172--191}, year = {2010}, url = {https://doi.org/10.1504/IJBIDM.2010.031286}, doi = {10.1504/IJBIDM.2010.031286}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/GohZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/AbdullahXGL10, author = {Noraswaliza Abdullah and Yue Xu and Shlomo Geva and Mark Looi}, editor = {Max Bramer}, title = {Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques}, booktitle = {Artificial Intelligence in Theory and Practice {III} - Third {IFIP} {TC} 12 International Conference on Artificial Intelligence, {IFIP} {AI} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {331}, pages = {57--66}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15286-3\_6}, doi = {10.1007/978-3-642-15286-3\_6}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip12/AbdullahXGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/SebastianTFL10, author = {Alvin Sebastian and Maolin Tang and Yanming Feng and Mark Looi}, title = {A Multicast Routing Scheme for Efficient Safety Message Dissemination in {VANET}}, booktitle = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2010, Proceedings, Sydney, Australia, 18-21 April 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCNC.2010.5506245}, doi = {10.1109/WCNC.2010.5506245}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/SebastianTFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GohZL09, author = {Vik Tor Goh and Jacob Zimmermann and Mark Looi}, title = {Towards Intrusion Detection for Encrypted Networks}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {540--545}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.76}, doi = {10.1109/ARES.2009.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GohZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ThamLF06, author = {Kevin Tham and Mark Looi and Ernest Foo}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {Ubiquitous Authorization Scheme Based on Device Profile}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {312--321}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_32}, doi = {10.1007/11807964\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/ThamLF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amt/2006, editor = {Yuefeng Li and Mark Looi and Ning Zhong}, title = {Advances in Intelligent {IT} - Active Media Technology 2006, Proceedings of the 4th International Conference on Active Media Technology, {AMT} 2006, June 7-9, 2006, Brisbane, Australia}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {138}, publisher = {{IOS} Press}, year = {2006}, isbn = {978-1-58603-615-7}, timestamp = {Tue, 21 Feb 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amt/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eee/AuCL05, author = {Wai{-}Ki Richard Au and Kim{-}Kwang Raymond Choo and Mark Looi}, title = {A Secure Anonymous Authorisation Architecture for E-Commerce}, booktitle = {2005 {IEEE} International Conference on e-Technology, e-Commerce, and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China}, pages = {106--111}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/EEE.2005.16}, doi = {10.1109/EEE.2005.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eee/AuCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/AuVCL04, author = {Richard Au and Harikrishna Vasanta and Kim{-}Kwang Raymond Choo and Mark Looi}, editor = {Marijn Janssen and Henk G. Sol and Ren{\'{e}} W. Wagenaar}, title = {A user-centric anonymous authorisation framework in e-commerce environment}, booktitle = {Proceedings of the 6th International Conference on Electronic Commerce, {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {60}, pages = {138--147}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1052220.1052238}, doi = {10.1145/1052220.1052238}, timestamp = {Fri, 08 Sep 2023 14:37:35 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/AuVCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/WullemsVLC04, author = {Chris Wullems and Harikrishna Vasanta and Mark Looi and Andrew J. Clark}, editor = {Ed Dawson and Wolfgang Klemm}, title = {A Broadcast Authentication and Integrity Augmentation for Trusted Differential {GPS} in Marine Navigation}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {125--139}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Sun, 23 Jun 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cau/WullemsVLC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mata/VasantaTBLN04, author = {Harikrishna Vasanta and Yiu Shing Terry Tin and Colin Boyd and Mark Looi and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ahmed Karmouch and Larry Korba and Edmundo Roberto Mauro Madeira}, title = {A Secure Framework for User Privacy in Heterogeneous Location Networks}, booktitle = {Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3284}, pages = {264--274}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30178-3\_25}, doi = {10.1007/978-3-540-30178-3\_25}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/mata/VasantaTBLN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/WullemsLC04, author = {Chris Wullems and Mark Looi and Andrew J. Clark}, title = {Towards Context-aware Security: An Authorization Architecture for Intranet Environments}, booktitle = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}}, pages = {132--137}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOMW.2004.1276919}, doi = {10.1109/PERCOMW.2004.1276919}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/WullemsLC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/AuYL03, author = {Richard Au and Ming Yao and Mark Looi}, title = {Privilege Negotiation Agents for Distributed Authorisation on World Wide Web}, booktitle = {2003 {IEEE/WIC} International Conference on Intelligent Agent Technology {(IAT} 2003), 13-17 October 2003, Halifax, Canada}, pages = {519--522}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IAT.2003.1241135}, doi = {10.1109/IAT.2003.1241135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/AuYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/AuYL03, author = {Richard Au and Ming Yao and Mark Looi}, editor = {Juan Manuel Cueva Lovelle and Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and Luis Joyanes Aguilar and Jos{\'{e}} Emilio Labra Gayo and Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z}, title = {Agent-Based Privilege Negotiation for E-commerce on World Wide Web}, booktitle = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain, July 14-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2722}, pages = {68--71}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45068-8\_10}, doi = {10.1007/3-540-45068-8\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icwe/AuYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/WullemsLC03, author = {Chris Wullems and Mark Looi and Andrew J. Clark}, title = {Enhancing the Security of Internet Applications using location: {A} New Model for Tamper-resistant {GSM} Location}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {1251--1258}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214286}, doi = {10.1109/ISCC.2003.1214286}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/WullemsLC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scs/SmithRL03, author = {Jason Smith and Selwyn Russell and Mark Looi}, editor = {Peter A. Lindsay and Anthony Cant}, title = {Security as a Safety Issue in Rail Communications}, booktitle = {Safety Critical Systems and Software 2003, Eigth Australian Workshop on Safety-Related Programmable Systems, (SCS2003), Canberra, ACT, Australia, 9-10 October 2003}, series = {{CRPIT}}, volume = {33}, pages = {79--88}, publisher = {Australian Computer Society}, year = {2003}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV33Smith.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scs/SmithRL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/AuYLA02, author = {Richard Au and Ming Yao and Mark Looi and Paul Ashley}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {Secure Client Agent Environment {(SCAE)} for World Wide Web}, booktitle = {E-Commerce and Web Technologies, Third International Conference, EC-Web 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2455}, pages = {234--243}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45705-4\_25}, doi = {10.1007/3-540-45705-4\_25}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/AuYLA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AuLAS01, author = {Richard Au and Mark Looi and Paul Ashley and Loo Tang Seet}, editor = {Kwangjo Kim}, title = {Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {369--381}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_28}, doi = {10.1007/3-540-45861-1\_28}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AuLAS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DawsonCL00, author = {Ed Dawson and Andrew J. Clark and Mark Looi}, title = {Key management in a non-trusted distributed environment}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {4}, pages = {319--329}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00056-4}, doi = {10.1016/S0167-739X(99)00056-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DawsonCL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuLA00, author = {Richard Au and Mark Looi and Paul Ashley}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Towards a New Authorisation Paradigm for Extranets}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {18--29}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_2}, doi = {10.1007/10718964\_2}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuLA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PrasetijoALCG00, author = {Agung Budi Prasetijo and Paul Ashley and Mark Looi and Andrew J. Clark and Gary Gaskell}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Three-Party {HTTP} Proxy to Support Internet Content Regulation}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {89--96}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_8}, doi = {10.1007/10718964\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PrasetijoALCG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ReidL00, author = {Jason Reid and Mark Looi}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Making Sense of Smart Card Security Certifications}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {225--240}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 01 Aug 2002 11:36:41 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ReidL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AuLA00, author = {Richard Au and Mark Looi and Paul Ashley}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Cross-domain one-shot authorization using smart cards}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {220--227}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352635}, doi = {10.1145/352600.352635}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AuLA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/LooiASAGV98, author = {Mark Looi and Paul Ashley and Loo Tang Seet and Richard Au and Gary Gaskell and Mark Vandenwauver}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Enhancing {SESAMEV4} with Smart Cards}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {193--202}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_17}, doi = {10.1007/10721064\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/LooiASAGV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GaskellLDBR98, author = {Gary Gaskell and Mark Looi and Ed Dawson and Colin Boyd and Selwyn Russell}, title = {A security architecture for third generation wireless systems}, booktitle = {The 1st International Conference on Information Security and Cryptology, {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings}, pages = {15--32}, publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}}, year = {1998}, timestamp = {Fri, 11 Jan 2002 12:38:44 +0100}, biburl = {https://dblp.org/rec/conf/icisc/GaskellLDBR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/GaskellL95, author = {Gary Gaskell and Mark Looi}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {Integrating Smart Cards Into Authentication Systems}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {270--281}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032365}, doi = {10.1007/BFB0032365}, timestamp = {Sat, 19 Oct 2019 20:36:44 +0200}, biburl = {https://dblp.org/rec/conf/cpa/GaskellL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LooiC94, author = {Mark Looi and William J. Caelli}, title = {A note on supplying a trusted clock via a secure device}, journal = {Comput. Secur.}, volume = {13}, number = {7}, pages = {611--613}, year = {1994}, url = {https://doi.org/10.1016/0167-4048(94)90012-4}, doi = {10.1016/0167-4048(94)90012-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LooiC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.