Mark Looi
According to our database1,
Mark Looi
authored at least 27 papers
between 1994 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks.
J. Networks, 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Int. J. Bus. Intell. Data Min., 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques.
Proceedings of the Artificial Intelligence in Theory and Practice III, 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
2004
Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the 6th International Conference on Electronic Commerce, 2004
2003
Proceedings of the Safety Critical Systems and Software 2003, 2003
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003
2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
2001
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
Proceedings of the Information Security and Cryptology, 2001
2000
Future Gener. Comput. Syst., 2000
Proceedings of the CCS 2000, 2000
Making Sense of Smart Card Security Certifications.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1998
A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994