BibTeX records: Po-Wah Yau

download as .bib file

@inproceedings{DBLP:conf/secsr/KayuniKLMY15,
  author       = {Mwawi Nyirenda Kayuni and
                  Mohammed Shafiul Alam Khan and
                  Wanpeng Li and
                  Chris J. Mitchell and
                  Po{-}Wah Yau},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Generating Unlinkable IPv6 Addresses},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_10},
  doi          = {10.1007/978-3-319-27152-1\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KayuniKLMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/YauT11,
  author       = {Po{-}Wah Yau and
                  Allan Tomlinson},
  title        = {Towards Privacy in a Context-Aware Social Network Based Recommendation
                  System},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {862--865},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.87},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/YauT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TomlinsonYM10,
  author       = {Allan Tomlinson and
                  Po{-}Wah Yau and
                  John A. MacDonald},
  title        = {Privacy threats in a mobile enterprise social network},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {15},
  number       = {2},
  pages        = {57--66},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.istr.2010.10.004},
  doi          = {10.1016/J.ISTR.2010.10.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TomlinsonYM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BalfeYP10,
  author       = {Shane Balfe and
                  Po{-}Wah Yau and
                  Kenneth G. Paterson},
  title        = {A guide to trust in mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {503--516},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.147},
  doi          = {10.1002/SEC.147},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BalfeYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gca/YauT09,
  author       = {Po{-}Wah Yau and
                  Allan Tomlinson},
  editor       = {Hamid R. Arabnia and
                  George A. Gravvanis},
  title        = {Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation},
  booktitle    = {Proceedings of the 2009 International Conference on Grid Computing
                  {\&} Applications, {GCA} 2009, July 13-16, 2009, Las Vegas, Nevada,
                  {USA}},
  pages        = {113--119},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 08 Dec 2010 08:34:33 +0100},
  biburl       = {https://dblp.org/rec/conf/gca/YauT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/YauTBG08,
  author       = {Po{-}Wah Yau and
                  Allan Tomlinson and
                  Shane Balfe and
                  Eimear Gallery},
  title        = {Securing Grid Workflows with Trusted Computing (Extended Abstract)},
  booktitle    = {8th {IEEE} International Symposium on Cluster Computing and the Grid
                  (CCGrid 2008), 19-22 May 2008, Lyon, France},
  pages        = {700},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CCGRID.2008.77},
  doi          = {10.1109/CCGRID.2008.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/YauTBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/YauTBG08,
  author       = {Po{-}Wah Yau and
                  Allan Tomlinson and
                  Shane Balfe and
                  Eimear Gallery},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Securing Grid Workflows with Trusted Computing},
  booktitle    = {Computational Science - {ICCS} 2008, 8th International Conference,
                  Krak{\'{o}}w, Poland, June 23-25, 2008, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5103},
  pages        = {510--519},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69389-5\_58},
  doi          = {10.1007/978-3-540-69389-5\_58},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/YauTBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MartinY07,
  author       = {Andrew P. Martin and
                  Po{-}Wah Yau},
  title        = {Grid security: Next steps},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {12},
  number       = {3},
  pages        = {113--122},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.istr.2007.05.009},
  doi          = {10.1016/J.ISTR.2007.05.009},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MartinY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/Yau05,
  author       = {Po{-}Wah Yau},
  editor       = {Xiaohua Jia and
                  Jie Wu and
                  Yanxiang He},
  title        = {Recovering Extra Routes with the Path from Loop Recovery Protocol},
  booktitle    = {Mobile Ad-hoc and Sensor Networks, First International Conference,
                  {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3794},
  pages        = {676--688},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599463\_66},
  doi          = {10.1007/11599463\_66},
  timestamp    = {Wed, 11 Mar 2020 08:37:17 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/Yau05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weworc/2005,
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24840},
  isbn         = {3-88579-403-9},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weworc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics