A guide to trust in mobile ad hoc networks
Balfe, Shane, Yau, Po-Wah, Paterson, Kenneth G.
Published in Security and communication networks (01.11.2010)
Published in Security and communication networks (01.11.2010)
Get full text
Journal Article
Recovering Extra Routes with the Path from Loop Recovery Protocol
Get full text
Book Chapter
Conference Proceeding
Towards Privacy in a Context-Aware Social Network Based Recommendation System
Po-Wah Yau, Tomlinson, A.
Published in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing (01.10.2011)
Published in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing (01.10.2011)
Get full text
Conference Proceeding
Privacy threats in a mobile enterprise social network
Tomlinson, Allan, Yau, Po-Wah, MacDonald, John A.
Published in Information security technical report (01.05.2010)
Published in Information security technical report (01.05.2010)
Get full text
Journal Article
Securing Grid Workflows with Trusted Computing (Extended Abstract)
Po-Wah Yau, Tomlinson, A., Balfe, S., Gallery, E.
Published in 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID) (01.05.2008)
Published in 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID) (01.05.2008)
Get full text
Conference Proceeding