Larry Korba

According to our database1, Larry Korba authored at least 65 papers between 1983 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

2008
Security Personalization for Internet and Web Services.
Int. J. Web Serv. Res., 2008

A Scalable Group Key Management Protocol.
IEEE Commun. Lett., 2008

Assessing the Likelihood of Privacy Policy Compliance.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Exploiting Multiple Features with MEMMs for Focused Web Crawling.
Proceedings of the Natural Language and Information Systems, 2008

An Efficient Privacy-Preserving Data Mining Platform.
Proceedings of The 2008 International Conference on Data Mining, 2008

Adapting LDA Model to Discover Author-Topic Relations for Email Analysis.
Proceedings of the Data Warehousing and Knowledge Discovery, 10th International Conference, 2008

Cooperative Visualization of Privacy Risks.
Proceedings of the Cooperative Design, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions.
Proceedings of the Advances in Artificial Intelligence , 2008

Using Data Mining Methods to Predict Personally Identifiable Information in Emails.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

2007
Privacy Rights Management: Implementation Scenarios.
Inf. Resour. Manag. J., 2007

Protect Virtual Property in Online Gaming System.
Int. J. Softw. Eng. Knowl. Eng., 2007

Privacy management system using social networking.
Proceedings of the IEEE International Conference on Systems, 2007

Expectation Propagation in GenSpace Graphs for Summarization.
Proceedings of the Data Warehousing and Knowledge Discovery, 9th International Conference, 2007

Analysis of Smart Card-Based Remote User Authentication Schemes.
Proceedings of the 2007 International Conference on Security & Management, 2007

Private Data Management in Collaborative Environments.
Proceedings of the Cooperative Design, 2007

Privacy Rights Management for Privacy Compliance Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks.
Perform. Evaluation, 2006

Ensuring Privacy for Buyer-Seller E-Commerce.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Automated Social Network Analysis for Collaborative Work.
Proceedings of the Cooperative Design, 2006

Towards Designing Secure Online Games.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Ensuring Privacy for E-Health Services.
Proceedings of the The First International Conference on Availability, 2006

2005
Distributed device networks with security constraints.
IEEE Trans. Ind. Informatics, 2005

An analysis of online gaming crime characteristics.
Internet Res., 2005

Context-aware privacy and security agents for distance education.
Int. J. High Perform. Comput. Netw., 2005

Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business.
Int. J. E Bus. Res., 2005

An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks.
Comput. Commun., 2005

AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Specifying Personal Privacy Policies to Avoid Unexpected Outcomes.
Proceedings of the Third Annual Conference on Privacy, 2005

Online Gaming Cheating and Security Issue.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Context-Aware Security Policy Agent for Mobile Internet Services.
Proceedings of the Intelligence in Communication Systems, 2005

Negotiated Security Policies for E-Services and Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Protection of Virtual Property in Online Gaming.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Agent-based Transactions for Home Energy Services.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering.
Proceedings of the Cooperative Design, 2005

An Agent Architecture for e-Services Privacy Policy Compliance.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan.
Proceedings of the Second Annual Conference on Privacy, 2004

A novel solution for achieving anonymity in wireless ad hoc networks.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004

Scalability, Security Technologies and Mobile Applications.
Proceedings of the Mobility Aware Technologies and Applications, 2004

SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

How to Make E-cash with Non-Repudiation and Anonymity.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Privacy Policy Compliance for Web Services.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Scalability of Agent-Based Onion Routing Network.
Proceedings of the 19th International Conference on Computers and Their Applications, 2004

Security and Privacy Technologies for Distance Education Applications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Pay-TV system with strong privacy and non-repudiation protection.
IEEE Trans. Consumer Electron., 2003

Privacy and Security in E-Learning.
Int. J. Distance Educ. Technol., 2003

Cryptanalysis of scalable multicast security protocol.
IEEE Commun. Lett., 2003

Bilateral E-services Negotiation Under Uncertainty.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

Future Interactions in Policy-Driven Privacy Management.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VII, 2003

2002
Applying digital rights management systems to privacy rights management.
Comput. Secur., 2002

Anonymous Communications for Mobile Agents.
Proceedings of the Mobile Agents for Telecommunication Applications, 2002

Anonymous Internet Communication Based on IPSec.
Proceedings of the Communication Systems: The State of the Art, IFIP 17<sup>th</sup> World Computer Congress, 2002

Privacy in Distributed Electronic Commerce.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Towards Meeting the Privacy Challenge: Adapting DRM.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Of Networks, Interactions and Agents: An Approach for Social Network Analysis.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

Towards Distributed Privacy for CSCW.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

2000
Incorporating communication monitoring and control facility in multi-agent systems.
Proceedings of the IEEE International Conference on Systems, 2000

Towards Policy-Driven Agent Development and Management.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000

1999
Towards Securing Network Management Agent Distribution and Communication.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

Towards Secure Agent Distribution and Communication.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
Security system for wireless local area networks.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1994
Variable Aperture Sonar for Mobile Robots.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994

1983
The MOD Keyboard.
IEEE Micro, 1983


  Loading...