De Oliveira Albuquerque, R and Garcia Villalba, LJ and Sandoval Orozco, AL and Buiati, F and Kim, TH, A layered trust information security architecture, Sensors, 14, (12) pp. 22754-22772. ISSN 1424-8220 (2014) [Refereed Article]
Grobler, TL and van Zyl, AJ and Olivier, JC and Kleynhans, W and Salmon, BP and Penzhorn, WT, Wu's algorithm and its possible application in cryptanalysis, African Journal of Mathematics and Computer Science Research, 5, (1) pp. 1-8. ISSN 2006-9731 (2012) [Refereed Article]
Bhattacharyya, D and Kim, TH and Lee, G-S, Watermarking using multiresolution cosine transformation: a review, Communications in Computer and Information Science 260: Proceedings of the 2011 International Conference on Signal Processing, Image Processing and Pattern Recognition, 8-10 December 2011, Jeju Island, South Korea, pp. 126-139. ISBN 978-3-642-27182-3 (2011) [Refereed Conference Paper]
Hartnett, JS, Why One Signing Key is Not Enough, HIC2003 RACGP12CC Handbook of Abstracts, 10-12 August 2003, Darling Harbour Sydney Australia EJ ISBN 0 9751013 0 7 (2003) [Conference Extract]
This list was generated on Sat Feb 4 07:32:57 2023.