![]() |
| 2006 | ||
|---|---|---|
| 3 | EE | Simon McNicol, Serdar Boztas, Asha Rao: Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. AAECC 2006: 215-224 |
| 2004 | ||
| 2 | EE | Joselíto J. Chua, Asha Rao: An Image-Guided Heuristic for Planning an Exhaustive Enumeration. HIS 2004: 136-141 |
| 2003 | ||
| 1 | Tom Cribb, Asha Rao: An Information Security Management Model. Security and Management 2003: 654-657 | |
| 1 | Serdar Boztas | [3] |
| 2 | Joselíto J. Chua | [2] |
| 3 | Tom Cribb | [1] |
| 4 | Simon McNicol | [3] |