Shane Balfe

According to our database1, Shane Balfe authored at least 17 papers between 2005 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A guide to trust in mobile ad hoc networks.
Secur. Commun. Networks, 2010

Identity crisis: on the problem of namespace design for ID-PKC and MANETs.
Secur. Commun. Networks, 2010

2009
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Enforcing trust in pervasive computing.
Int. J. Syst. Syst. Eng., 2008

Challenges for Trusted Computing.
IEEE Secur. Priv., 2008

Securing information flows: A metadata framework.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Securing Grid Workflows with Trusted Computing.
Proceedings of the Computational Science, 2008

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Trust management for secure information flows.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

e-EMV: emulating EMV for internet payments with trusted computing technologies.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Securing Grid Workflows with Trusted Computing (Extended Abstract).
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
Proceedings of the The Third International Conference on Availability, 2008

2007
Final Fantasy - Securing On-Line Gaming with Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Mobile Agents and the Deus Ex Machina.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Pervasive Trusted Computing.
Proceedings of the Second International Workshop on Security, 2006

Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Trusted Computing: Providing Security for Peer-to-Peer Networks.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005


  Loading...