![]() |
| 2002 | ||
|---|---|---|
| 4 | K. Abu Bakar, B. S. Doherty: A New Model for Protecting Mobile Agents Against Malicious Host. ICWI 2002: 780-784 | |
| 1997 | ||
| 3 | B. S. Doherty, Mohd Aizaini Maarof: Integrating Security Services Into Collaborative Systems. WebNet 1997 | |
| 1990 | ||
| 2 | B. S. Doherty, B. Pauly, J. Barthelemy: Elicitation and Verification of a Functional Specification. ECAI 1990: 234-239 | |
| 1988 | ||
| 1 | B. S. Doherty, J. J. Stuart: Induction and Dialogue in Specification Formalisation: An Object-Based Approach. ECAI 1988: 67-69 | |
| 1 | K. Abu Bakar | [4] |
| 2 | J. Barthelemy | [2] |
| 3 | Mohd Aizaini Maarof | [3] |
| 4 | B. Pauly | [2] |
| 5 | J. J. Stuart | [1] |