Mark Looi

According to our database1, Mark Looi
  • authored at least 27 papers between 1994 and 2012.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks.
JNW, 2012

Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Experimenting with an Intrusion Detection System for Encrypted Networks.
IJBIDM, 2010

A Multicast Routing Scheme for Efficient Safety Message Dissemination in VANET.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques.
Proceedings of the Artificial Intelligence in Theory and Practice III, 2010

Towards Intrusion Detection for Encrypted Networks.
Proceedings of the The Forth International Conference on Availability, 2009

Ubiquitous Authorization Scheme Based on Device Profile.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Secure Anonymous Authorisation Architecture for E-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

A Secure Framework for User Privacy in Heterogeneous Location Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2004

A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

A user-centric anonymous authorisation framework in e-commerce environment.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

Security as a Safety Issue in Rail Communications.
Proceedings of the Safety Critical Systems and Software 2003, 2003

Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Agent-Based Privilege Negotiation for E-commerce on World Wide Web.
Proceedings of the Web Engineering, International Conference, 2003

Privilege Negotiation Agents for Distributed Authorisation on World Wide Web.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

Secure Client Agent Environment (SCAE) for World Wide Web.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
Proceedings of the Information Security and Cryptology, 2001

Key management in a non-trusted distributed environment.
Future Generation Comp. Syst., 2000

Cross-domain one-shot authorization using smart cards.
Proceedings of the CCS 2000, 2000

Making Sense of Smart Card Security Certifications.
Proceedings of the Smart Card Research and Advanced Applications, 2000

A Three-Party HTTP Proxy to Support Internet Content Regulation.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Towards a New Authorisation Paradigm for Extranets.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

Enhancing SESAMEV4 with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Integrating Smart Cards Into Authentication Systems.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A note on supplying a trusted clock via a secure device.
Computers & Security, 1994