Your selections:
‚Us and them‘: thinking beyond the security ethic
- Lovat, Terence, Fleming, Dan
A flexible authentication and authorisation mechanism for securing transactions in digital ecosystem
- Pranata, Ilung, Skinner, Geoff, Athauda, Rukshan
Securing and governing access in ad-hoc networks of internet of things
- Pranata, Ilung, Athauda, Rukshan I., Skinner, Geoff
Terror, security, and money: assessing the cost-effectiveness of critical infrastructure protection
- Stewart, Mark G., Mueller, John
Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening
- Stewart, Mark G., Mueller, John
Modeling analysis and control research framework of cyber physical power systems
- Zhao, Junhua, Wen, Fushuan, Xue, Yusheng, Dong, Zhaoyang
Peer-based complex profile management
- Wallis, Mark, Henskens, Frans, Hannaford, Michael
Power at the heart of the present: exception, risk and sovereignty
A prototype design for enhancing customer trust in online payments
- Al-Dala'in, Thair, Summons, Peter, Luo, Suhuai
Australian regional strategy, terrorism and the risk of asymmetric warfare
Securing an EHR in a health sector digital ecosystem
- Regan, Brian, Pusatli, O. Tolga, Lutton, Eugene, Athauda, Rukshan
A review of current online payment systems related to security and trust solutions
- Al-Dala'in, Thair, Luo, Suhuai, Summons, Peter
A risk and cost-benefit assessment of United States aviation security measures
- Stewart, Mark, Mueller, John
Application based meta tagging of network connections
- Wallis, Mark, Henskens, Frans, Hannaford, Michael
Special collection: security (editorial)
- Brankovic, Ljiljana, Miller, Mirka, Steketee, Chris
Statistical disclosure control: to trust or not to trust
- Giggins, Helen, Brankovic, Ljiljana
Are you sure you would like to clear your session, including search history and login status?