UCT CS Research Document Archive

Subject: F.2 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY


    Number of records: 6.

  1. Kayem, Anne V.D.M., Selim G. Akl and Patrick Martin (2010) Adaptive Cryptographic Access Control, Jajodia, Sushil, Eds. . Springer.

  2. Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments. Wiley's Security and Communication Networks Journal 4(1):74-94.

  3. Nirenstein, Shaun (2003) Fast and Accurate Visibility Preprocessing. PhD, Department of Computer Science, University of Cape Town.

  4. Kayem, Anne V.D.M., Azhar Deshai and Stuart Hammer (2012) On Anonymizing Social Network Graphs. In Proceedings 11th Information Security Conference (ISSA 2012), pages 1-8, Johannesburg, South Africa.

  5. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global.

  6. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2012) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pages 95-128. IGI Global.

  7. This list was generated on Sat Aug 19 16:15:22 SAST 2017.