1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.
Filter
Other chapter contribution

Search results

  • 2012

    Trends in government e-authentication: Policy and practice

    Just, M. & Renaud, K., 2012, Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks. Bwalya, K. J. & Zulu, S. F. C. (eds.). IGI Global, p. 664-677

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    1 Citation (Scopus)
  • Workshop on: Exploring the challenges of ethics, privacy and trust in serious gaming

    Mccall, R., Baillie, L., Boehm, F. & Just, M., 2012, Proceedings of the 11th International Conference on Entertainment Computing : ICEC 12. Springer, Vol. 7522. p. 584-585 (Entertainment Computing - ICEC 2012; vol. 7522).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  • 2003

    Resisting malicious packet dropping in wireless ad hoc networks

    Just, M., Kranakis, E. & Wan, T., 2003, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2003. Springer, Vol. 2865. p. 151-163 (Ad-Hoc, Mobile, and Wireless Networks; vol. 2865).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    24 Citations (Scopus)
  • 1996

    Authenticated multi-party key agreement

    Just, M. & Vaudenay, S., 1996, Advances in Cryptology - ASIACRYPT '96. New York (New York): Springer, p. 36-49 14 p. Chapter 4. (Lecture Notes in Computer Science Book Series (LNCS); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    119 Citations (Scopus)