СТ |
Covert Distributed Computing Using Java Through Web Spoofing |
1998 |
Horton J., Seberry J. |
|
|
|
Lecture Notes in Computer Science |
22.07.1998 |
СТ |
Information Security in Mobile Databases |
1995 |
Hardjono T., Seberry J. |
|
|
|
Australian Computer Science Communications |
18.05.1995 |
СТ |
Beacon Based Authentication |
1994 |
Jiwa A., Seberry J., Zheng Y. |
|
|
|
Lecture Notes in Computer Science |
06.12.1994 |
СТ |
Authentication via Multi-Service Tickets in the Kuperee Server |
1994 |
Hardjono T., Seberry J. |
|
|
|
Lecture Notes in Computer Science |
06.12.1994 |