![]() | ![]() |
2001 | ||
---|---|---|
3 | EE | John Yesberg, Marie Henderson: Applications of Trusted Review to Information Security. ACISP 2001: 305-319 |
1996 | ||
2 | EE | Mark S. Anderson, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John Yesberg, Kenneth Kwok-Hei Yiu: Starlight: Interactive Link. ACSAC 1996: 55-64 |
1 | EE | John Yesberg, Mark S. Anderson: Quantitative authentication and vouching. Computers & Security 15(7): 633-645 (1996) |
1 | Mark S. Anderson | [1] [2] |
2 | John Edmund Griffin | [2] |
3 | Marie Henderson | [3] |
4 | Robert Brunyee Milner | [2] |
5 | Christopher James North | [2] |
6 | Kenneth Kwok-Hei Yiu | [2] |