| 2009 |
23 | | Vik Tor Goh,
Jacob Zimmermann,
Mark Looi:
Towards Intrusion Detection for Encrypted Networks.
ARES 2009: 540-545 |
| 2006 |
22 | | Yuefeng Li,
Mark Looi,
Ning Zhong:
Advances in Intelligent IT - Active Media Technology 2006, Proceedings of the 4th International Conference on Active Media Technology, AMT 2006, June 7-9, 2006, Brisbane, Australia
IOS Press 2006 |
21 | | Kevin Tham,
Mark Looi,
Ernest Foo:
Ubiquitous Authorization Scheme Based on Device Profile.
EUC Workshops 2006: 312-321 |
| 2005 |
20 | | Wai-Ki Richard Au,
Kim-Kwang Raymond Choo,
Mark Looi:
A Secure Anonymous Authorisation Architecture for E-Commerce.
EEE 2005: 106-111 |
| 2004 |
19 | | Chris Wullems,
Harikrishna Vasanta,
Mark Looi,
Andrew Clark:
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Cryptographic Algorithms and their Uses 2004: 125-139 |
18 | | Richard Au,
Harikrishna Vasanta,
Kim-Kwang Raymond Choo,
Mark Looi:
A user-centric anonymous authorisation framework in e-commerce environment.
ICEC 2004: 138-147 |
17 | | Harikrishna Vasanta,
Yiu Shing Terry Tin,
Colin Boyd,
Mark Looi,
Juan Manuel González Nieto:
A Secure Framework for User Privacy in Heterogeneous Location Networks.
MATA 2004: 264-274 |
16 | | Chris Wullems,
Mark Looi,
Andrew Clark:
Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
PerCom Workshops 2004: 132-137 |
| 2003 |
15 | | Richard Au,
Ming Yao,
Mark Looi:
Privilege Negotiation Agents for Distributed Authorisation on World Wide Web.
IAT 2003: 519-522 |
14 | | Richard Au,
Ming Yao,
Mark Looi:
Agent-Based Privilege Negotiation for E-commerce on World Wide Web.
ICWE 2003: 68-71 |
13 | | Chris Wullems,
Mark Looi,
Andrew Clark:
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
ISCC 2003: 1251-1258 |
12 | | Jason Smith,
Selwyn Russell,
Mark Looi:
Security as a Safety Issue in Rail Communications.
SCS 2003: 79-88 |
| 2002 |
11 | | Richard Au,
Ming Yao,
Mark Looi,
Paul Ashley:
Secure Client Agent Environment (SCAE) for World Wide Web.
EC-Web 2002: 234-243 |
| 2001 |
10 | | Richard Au,
Mark Looi,
Paul Ashley,
Loo Tang Seet:
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
ICISC 2001: 369-381 |
| 2000 |
9 | | Richard Au,
Mark Looi,
Paul Ashley:
Towards a New Authorisation Paradigm for Extranets.
ACISP 2000: 18-29 |
8 | | Agung Prasetijo,
Paul Ashley,
Mark Looi,
Andrew Clark,
Gary Gaskell:
A Three-Party HTTP Proxy to Support Internet Content Regulation.
ACISP 2000: 89-96 |
7 | | Richard Au,
Mark Looi,
Paul Ashley:
Cross-domain one-shot authorization using smart cards.
ACM Conference on Computer and Communications Security 2000: 220-227 |
6 | | Jason Reid,
Mark Looi:
Making Sense of Smart Card Security Certifications.
CARDIS 2000: 225-240 |
5 | | Ed Dawson,
Andrew Clark,
Mark Looi:
Key management in a non-trusted distributed environment.
Future Generation Comp. Syst. 16(4): 319-329 (2000) |
| 1998 |
4 | | Mark Looi,
Paul Ashley,
Loo Tang Seet,
Richard Au,
Gary Gaskell,
Mark Vandenwauver:
Enhancing SESAMEV4 with Smart Cards.
CARDIS 1998: 193-202 |
3 | | Gary Gaskell,
Mark Looi,
Ed Dawson,
Colin Boyd,
Selwyn Russell:
A security architecture for third generation wireless systems.
ICISC 1998: 15-32 |
| 1995 |
2 | | Gary Gaskell,
Mark Looi:
Integrating Smart Cards Into Authentication Systems.
Cryptography: Policy and Algorithms 1995: 270-281 |
| 1994 |
1 | | Mark Looi,
William J. Caelli:
A note on supplying a trusted clock via a secure device.
Computers & Security 13(7): 611-613 (1994) |