1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Other chapter contribution
2012

Trends in government e-authentication: Policy and practice

Just, M. & Renaud, K., 2012, Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks. Bwalya, K. J. & Zulu, S. F. C. (eds.). IGI Global, p. 664-677

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Workshop on: Exploring the challenges of ethics, privacy and trust in serious gaming

Mccall, R., Baillie, L., Boehm, F. & Just, M., 2012, Proceedings of the 11th International Conference on Entertainment Computing : ICEC 12. Springer, Vol. 7522. p. 584-585 (Entertainment Computing - ICEC 2012; vol. 7522).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

2003

Resisting malicious packet dropping in wireless ad hoc networks

Just, M., Kranakis, E. & Wan, T., 2003, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2003. Springer, Vol. 2865. p. 151-163 (Ad-Hoc, Mobile, and Wireless Networks; vol. 2865).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

1996

Authenticated multi-party key agreement

Just, M. & Vaudenay, S., 1996, Advances in Cryptology - ASIACRYPT '96. New York (New York): Springer, p. 36-49 14 p. Chapter 4. (Lecture Notes in Computer Science Book Series (LNCS); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution