2006 | ||
---|---|---|
3 | EE | Simon McNicol, Serdar Boztas, Asha Rao: Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. AAECC 2006: 215-224 |
2004 | ||
2 | EE | Joselíto J. Chua, Asha Rao: An Image-Guided Heuristic for Planning an Exhaustive Enumeration. HIS 2004: 136-141 |
2003 | ||
1 | Tom Cribb, Asha Rao: An Information Security Management Model. Security and Management 2003: 654-657 |
1 | Serdar Boztas | [3] |
2 | Joselíto J. Chua | [2] |
3 | Tom Cribb | [1] |
4 | Simon McNicol | [3] |