Christopher Bolan

According to our database1, Christopher Bolan authored at least 11 papers between 2004 and 2010.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Using the Generation One EPC RFID LockID Command as a Method of Directed Attack.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

The 2010 IDN Homograph Attack Mitigation Survey.
Proceedings of the 2010 International Conference on Security & Management, 2010

Forensic Data Reocvery on the 8GB Fifth Generation iPod Nano.
Proceedings of the 2010 International Conference on Security & Management, 2010

Using Traffic Analysis to Identify Tor Usage - A Proposed Study.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Freegate: A Defence against the Pending Censorship of Australia?.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

2008
A Review of the Electronic Product Code Standards for RFID Technology.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2007
Radio Frequency Identification: a review of low cost tag security proposals.
Int. J. Inf. Comput. Secur., 2007

KILL Features of RFID Tags in a Medical Environment: Boon or Burden?
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Do No Harm: The Use of RFID Tags in a Medical Environment.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
Computer Security Research: Approaches and Assumptions.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

Need to Know: Security or Liability?
Proceedings of the 2nd Australian Information Security Management Conference, 2004


  Loading...