Mark Looi

According to our database1, Mark Looi
  • authored at least 27 papers between 1994 and 2012.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks.
JNW, 2012

2011
Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Experimenting with an Intrusion Detection System for Encrypted Networks.
IJBIDM, 2010

A Multicast Routing Scheme for Efficient Safety Message Dissemination in VANET.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques.
Proceedings of the Artificial Intelligence in Theory and Practice III, 2010

2009
Towards Intrusion Detection for Encrypted Networks.
Proceedings of the The Forth International Conference on Availability, 2009

2006
Ubiquitous Authorization Scheme Based on Device Profile.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
A Secure Anonymous Authorisation Architecture for E-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

A Secure Framework for User Privacy in Heterogeneous Location Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2004

A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

A user-centric anonymous authorisation framework in e-commerce environment.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Security as a Safety Issue in Rail Communications.
Proceedings of the Safety Critical Systems and Software 2003, 2003

Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Agent-Based Privilege Negotiation for E-commerce on World Wide Web.
Proceedings of the Web Engineering, International Conference, 2003

Privilege Negotiation Agents for Distributed Authorisation on World Wide Web.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

2002
Secure Client Agent Environment (SCAE) for World Wide Web.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

2001
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
Proceedings of the Information Security and Cryptology, 2001

2000
Key management in a non-trusted distributed environment.
Future Generation Comp. Syst., 2000

Cross-domain one-shot authorization using smart cards.
Proceedings of the CCS 2000, 2000

Making Sense of Smart Card Security Certifications.
Proceedings of the Smart Card Research and Advanced Applications, 2000

A Three-Party HTTP Proxy to Support Internet Content Regulation.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Towards a New Authorisation Paradigm for Extranets.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1998
A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

Enhancing SESAMEV4 with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1995
Integrating Smart Cards Into Authentication Systems.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
A note on supplying a trusted clock via a secure device.
Computers & Security, 1994


  Loading...