Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Po-Wah Yau
@inproceedings{DBLP:conf/secsr/KayuniKLMY15, author = {Mwawi Nyirenda Kayuni and Mohammed Shafiul Alam Khan and Wanpeng Li and Chris J. Mitchell and Po{-}Wah Yau}, editor = {Liqun Chen and Shin'ichiro Matsuo}, title = {Generating Unlinkable IPv6 Addresses}, booktitle = {Security Standardisation Research - Second International Conference, {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9497}, pages = {185--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27152-1\_10}, doi = {10.1007/978-3-319-27152-1\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/KayuniKLMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/YauT11, author = {Po{-}Wah Yau and Allan Tomlinson}, title = {Towards Privacy in a Context-Aware Social Network Based Recommendation System}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {862--865}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.87}, doi = {10.1109/PASSAT/SOCIALCOM.2011.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/YauT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TomlinsonYM10, author = {Allan Tomlinson and Po{-}Wah Yau and John A. MacDonald}, title = {Privacy threats in a mobile enterprise social network}, journal = {Inf. Secur. Tech. Rep.}, volume = {15}, number = {2}, pages = {57--66}, year = {2010}, url = {https://doi.org/10.1016/j.istr.2010.10.004}, doi = {10.1016/J.ISTR.2010.10.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TomlinsonYM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BalfeYP10, author = {Shane Balfe and Po{-}Wah Yau and Kenneth G. Paterson}, title = {A guide to trust in mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {503--516}, year = {2010}, url = {https://doi.org/10.1002/sec.147}, doi = {10.1002/SEC.147}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BalfeYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gca/YauT09, author = {Po{-}Wah Yau and Allan Tomlinson}, editor = {Hamid R. Arabnia and George A. Gravvanis}, title = {Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation}, booktitle = {Proceedings of the 2009 International Conference on Grid Computing {\&} Applications, {GCA} 2009, July 13-16, 2009, Las Vegas, Nevada, {USA}}, pages = {113--119}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 08 Dec 2010 08:34:33 +0100}, biburl = {https://dblp.org/rec/conf/gca/YauT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/YauTBG08, author = {Po{-}Wah Yau and Allan Tomlinson and Shane Balfe and Eimear Gallery}, title = {Securing Grid Workflows with Trusted Computing (Extended Abstract)}, booktitle = {8th {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France}, pages = {700}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CCGRID.2008.77}, doi = {10.1109/CCGRID.2008.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/YauTBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/YauTBG08, author = {Po{-}Wah Yau and Allan Tomlinson and Shane Balfe and Eimear Gallery}, editor = {Marian Bubak and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {Securing Grid Workflows with Trusted Computing}, booktitle = {Computational Science - {ICCS} 2008, 8th International Conference, Krak{\'{o}}w, Poland, June 23-25, 2008, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {5103}, pages = {510--519}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69389-5\_58}, doi = {10.1007/978-3-540-69389-5\_58}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/YauTBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MartinY07, author = {Andrew P. Martin and Po{-}Wah Yau}, title = {Grid security: Next steps}, journal = {Inf. Secur. Tech. Rep.}, volume = {12}, number = {3}, pages = {113--122}, year = {2007}, url = {https://doi.org/10.1016/j.istr.2007.05.009}, doi = {10.1016/J.ISTR.2007.05.009}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MartinY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/Yau05, author = {Po{-}Wah Yau}, editor = {Xiaohua Jia and Jie Wu and Yanxiang He}, title = {Recovering Extra Routes with the Path from Loop Recovery Protocol}, booktitle = {Mobile Ad-hoc and Sensor Networks, First International Conference, {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3794}, pages = {676--688}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599463\_66}, doi = {10.1007/11599463\_66}, timestamp = {Wed, 11 Mar 2020 08:37:17 +0100}, biburl = {https://dblp.org/rec/conf/msn/Yau05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/weworc/2005, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24840}, isbn = {3-88579-403-9}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weworc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.