BibTeX records: Mark Looi

download as .bib file

@article{DBLP:journals/jnw/GuoL12,
  author       = {William W. Guo and
                  Mark Looi},
  title        = {A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection
                  in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1592--1599},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.10.1592-1599},
  doi          = {10.4304/JNW.7.10.1592-1599},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanGL11,
  author       = {Xiang Fan and
                  William W. Guo and
                  Mark Looi},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {Modeling and Simulating the Propagation of Unstructured Peer-to-Peer
                  Worms},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {573--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.132},
  doi          = {10.1109/CIS.2011.132},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/GohZL10,
  author       = {Vik Tor Goh and
                  Jacob Zimmermann and
                  Mark Looi},
  title        = {Experimenting with an Intrusion Detection System for Encrypted Networks},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {5},
  number       = {2},
  pages        = {172--191},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJBIDM.2010.031286},
  doi          = {10.1504/IJBIDM.2010.031286},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/GohZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/AbdullahXGL10,
  author       = {Noraswaliza Abdullah and
                  Yue Xu and
                  Shlomo Geva and
                  Mark Looi},
  editor       = {Max Bramer},
  title        = {Enhancement of Infrequent Purchased Product Recommendation Using Data
                  Mining Techniques},
  booktitle    = {Artificial Intelligence in Theory and Practice {III} - Third {IFIP}
                  {TC} 12 International Conference on Artificial Intelligence, {IFIP}
                  {AI} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September
                  20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {331},
  pages        = {57--66},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15286-3\_6},
  doi          = {10.1007/978-3-642-15286-3\_6},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip12/AbdullahXGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/SebastianTFL10,
  author       = {Alvin Sebastian and
                  Maolin Tang and
                  Yanming Feng and
                  Mark Looi},
  title        = {A Multicast Routing Scheme for Efficient Safety Message Dissemination
                  in {VANET}},
  booktitle    = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2010, Proceedings, Sydney, Australia, 18-21 April 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCNC.2010.5506245},
  doi          = {10.1109/WCNC.2010.5506245},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/SebastianTFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GohZL09,
  author       = {Vik Tor Goh and
                  Jacob Zimmermann and
                  Mark Looi},
  title        = {Towards Intrusion Detection for Encrypted Networks},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {540--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.76},
  doi          = {10.1109/ARES.2009.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GohZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ThamLF06,
  author       = {Kevin Tham and
                  Mark Looi and
                  Ernest Foo},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {Ubiquitous Authorization Scheme Based on Device Profile},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {312--321},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_32},
  doi          = {10.1007/11807964\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ThamLF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amt/2006,
  editor       = {Yuefeng Li and
                  Mark Looi and
                  Ning Zhong},
  title        = {Advances in Intelligent {IT} - Active Media Technology 2006, Proceedings
                  of the 4th International Conference on Active Media Technology, {AMT}
                  2006, June 7-9, 2006, Brisbane, Australia},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {138},
  publisher    = {{IOS} Press},
  year         = {2006},
  isbn         = {978-1-58603-615-7},
  timestamp    = {Tue, 21 Feb 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amt/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eee/AuCL05,
  author       = {Wai{-}Ki Richard Au and
                  Kim{-}Kwang Raymond Choo and
                  Mark Looi},
  title        = {A Secure Anonymous Authorisation Architecture for E-Commerce},
  booktitle    = {2005 {IEEE} International Conference on e-Technology, e-Commerce,
                  and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China},
  pages        = {106--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/EEE.2005.16},
  doi          = {10.1109/EEE.2005.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eee/AuCL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMicec/AuVCL04,
  author       = {Richard Au and
                  Harikrishna Vasanta and
                  Kim{-}Kwang Raymond Choo and
                  Mark Looi},
  editor       = {Marijn Janssen and
                  Henk G. Sol and
                  Ren{\'{e}} W. Wagenaar},
  title        = {A user-centric anonymous authorisation framework in e-commerce environment},
  booktitle    = {Proceedings of the 6th International Conference on Electronic Commerce,
                  {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {60},
  pages        = {138--147},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1052220.1052238},
  doi          = {10.1145/1052220.1052238},
  timestamp    = {Fri, 08 Sep 2023 14:37:35 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMicec/AuVCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/WullemsVLC04,
  author       = {Chris Wullems and
                  Harikrishna Vasanta and
                  Mark Looi and
                  Andrew J. Clark},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {A Broadcast Authentication and Integrity Augmentation for Trusted
                  Differential {GPS} in Marine Navigation},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {125--139},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Sun, 23 Jun 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/WullemsVLC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/VasantaTBLN04,
  author       = {Harikrishna Vasanta and
                  Yiu Shing Terry Tin and
                  Colin Boyd and
                  Mark Looi and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ahmed Karmouch and
                  Larry Korba and
                  Edmundo Roberto Mauro Madeira},
  title        = {A Secure Framework for User Privacy in Heterogeneous Location Networks},
  booktitle    = {Mobility Aware Technologies and Applications, First International
                  Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3284},
  pages        = {264--274},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30178-3\_25},
  doi          = {10.1007/978-3-540-30178-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mata/VasantaTBLN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/WullemsLC04,
  author       = {Chris Wullems and
                  Mark Looi and
                  Andrew J. Clark},
  title        = {Towards Context-aware Security: An Authorization Architecture for
                  Intranet Environments},
  booktitle    = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}},
  pages        = {132--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PERCOMW.2004.1276919},
  doi          = {10.1109/PERCOMW.2004.1276919},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/WullemsLC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/AuYL03,
  author       = {Richard Au and
                  Ming Yao and
                  Mark Looi},
  title        = {Privilege Negotiation Agents for Distributed Authorisation on World
                  Wide Web},
  booktitle    = {2003 {IEEE/WIC} International Conference on Intelligent Agent Technology
                  {(IAT} 2003), 13-17 October 2003, Halifax, Canada},
  pages        = {519--522},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IAT.2003.1241135},
  doi          = {10.1109/IAT.2003.1241135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/AuYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AuYL03,
  author       = {Richard Au and
                  Ming Yao and
                  Mark Looi},
  editor       = {Juan Manuel Cueva Lovelle and
                  Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and
                  Luis Joyanes Aguilar and
                  Jos{\'{e}} Emilio Labra Gayo and
                  Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z},
  title        = {Agent-Based Privilege Negotiation for E-commerce on World Wide Web},
  booktitle    = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain,
                  July 14-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2722},
  pages        = {68--71},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45068-8\_10},
  doi          = {10.1007/3-540-45068-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/AuYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WullemsLC03,
  author       = {Chris Wullems and
                  Mark Looi and
                  Andrew J. Clark},
  title        = {Enhancing the Security of Internet Applications using location: {A}
                  New Model for Tamper-resistant {GSM} Location},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {1251--1258},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214286},
  doi          = {10.1109/ISCC.2003.1214286},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WullemsLC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scs/SmithRL03,
  author       = {Jason Smith and
                  Selwyn Russell and
                  Mark Looi},
  editor       = {Peter A. Lindsay and
                  Anthony Cant},
  title        = {Security as a Safety Issue in Rail Communications},
  booktitle    = {Safety Critical Systems and Software 2003, Eigth Australian Workshop
                  on Safety-Related Programmable Systems, (SCS2003), Canberra, ACT,
                  Australia, 9-10 October 2003},
  series       = {{CRPIT}},
  volume       = {33},
  pages        = {79--88},
  publisher    = {Australian Computer Society},
  year         = {2003},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV33Smith.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scs/SmithRL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/AuYLA02,
  author       = {Richard Au and
                  Ming Yao and
                  Mark Looi and
                  Paul Ashley},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {Secure Client Agent Environment {(SCAE)} for World Wide Web},
  booktitle    = {E-Commerce and Web Technologies, Third International Conference, EC-Web
                  2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2455},
  pages        = {234--243},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45705-4\_25},
  doi          = {10.1007/3-540-45705-4\_25},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/AuYLA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AuLAS01,
  author       = {Richard Au and
                  Mark Looi and
                  Paul Ashley and
                  Loo Tang Seet},
  editor       = {Kwangjo Kim},
  title        = {Secure Authorisation Agent for Cross-Domain Access Control in a Mobile
                  Computing Environment},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {369--381},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_28},
  doi          = {10.1007/3-540-45861-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AuLAS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DawsonCL00,
  author       = {Ed Dawson and
                  Andrew J. Clark and
                  Mark Looi},
  title        = {Key management in a non-trusted distributed environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {319--329},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00056-4},
  doi          = {10.1016/S0167-739X(99)00056-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DawsonCL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuLA00,
  author       = {Richard Au and
                  Mark Looi and
                  Paul Ashley},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Towards a New Authorisation Paradigm for Extranets},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {18--29},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_2},
  doi          = {10.1007/10718964\_2},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuLA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PrasetijoALCG00,
  author       = {Agung Budi Prasetijo and
                  Paul Ashley and
                  Mark Looi and
                  Andrew J. Clark and
                  Gary Gaskell},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Three-Party {HTTP} Proxy to Support Internet Content Regulation},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_8},
  doi          = {10.1007/10718964\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PrasetijoALCG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ReidL00,
  author       = {Jason Reid and
                  Mark Looi},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Making Sense of Smart Card Security Certifications},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {225--240},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 01 Aug 2002 11:36:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ReidL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AuLA00,
  author       = {Richard Au and
                  Mark Looi and
                  Paul Ashley},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Cross-domain one-shot authorization using smart cards},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {220--227},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352635},
  doi          = {10.1145/352600.352635},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AuLA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/LooiASAGV98,
  author       = {Mark Looi and
                  Paul Ashley and
                  Loo Tang Seet and
                  Richard Au and
                  Gary Gaskell and
                  Mark Vandenwauver},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Enhancing {SESAMEV4} with Smart Cards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {193--202},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_17},
  doi          = {10.1007/10721064\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/LooiASAGV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GaskellLDBR98,
  author       = {Gary Gaskell and
                  Mark Looi and
                  Ed Dawson and
                  Colin Boyd and
                  Selwyn Russell},
  title        = {A security architecture for third generation wireless systems},
  booktitle    = {The 1st International Conference on Information Security and Cryptology,
                  {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings},
  pages        = {15--32},
  publisher    = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year         = {1998},
  timestamp    = {Fri, 11 Jan 2002 12:38:44 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/GaskellLDBR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/GaskellL95,
  author       = {Gary Gaskell and
                  Mark Looi},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {Integrating Smart Cards Into Authentication Systems},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {270--281},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032365},
  doi          = {10.1007/BFB0032365},
  timestamp    = {Sat, 19 Oct 2019 20:36:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cpa/GaskellL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LooiC94,
  author       = {Mark Looi and
                  William J. Caelli},
  title        = {A note on supplying a trusted clock via a secure device},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {611--613},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90012-4},
  doi          = {10.1016/0167-4048(94)90012-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LooiC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics