Search dblp for Publications

export results for "toc:db/journals/saj/saj31.bht:"

 download as .bib file

@article{DBLP:journals/saj/CoetzleeB03,
  author       = {L. Coetzlee and
                  Elizabeth C. Botha},
  title        = {Empirical results of an image-based automated vehicle identification
                  system},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {33--39},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27951},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/CoetzleeB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/CramptonK03,
  author       = {Jason Crampton and
                  Hemanth Khambhammettu},
  title        = {Access control in a distributed object environment using {XML} and
                  roles},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {2--8},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27956},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/CramptonK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/Kourie03,
  author       = {Derrick G. Kourie},
  title        = {Editorial},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {1--1},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27955},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/Kourie03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/LukellH03,
  author       = {S. A. Lukell and
                  A. C. M. Hutchison},
  title        = {Attack analysis of cryptographic protocols using strand spaces},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {25--32},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27952},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/LukellH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/Narendra03,
  author       = {Nanjangud C. Narendra},
  title        = {AdaptAgent : integrated architecture for adaptive workflow and agents},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {9--17},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27954},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/Narendra03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/Olivier03,
  author       = {Martin S. Olivier},
  title        = {A layered architecture for privacy - enhancing technologies},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {53--61},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27948},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/Olivier03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/PhamJ03,
  author       = {H. Pham and
                  Z. Jiang},
  title        = {Spam control via a distributed scheme of merit accumulation},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {62--69},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27947},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/PhamJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/SchliengerT03,
  author       = {Thomas Schlienger and
                  Stephanie Teufel},
  title        = {Information security culture - from analysis to change},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {46--52},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27949},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/SchliengerT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/SmithEVBP03,
  author       = {Elme Smith and
                  Mariki M. Eloff and
                  Lucas M. Venter and
                  Andries Barnard and
                  Laurette Pretorius},
  title        = {Agents, security and ethics: a framework for analysis},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {18--24},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27953},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/SmithEVBP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/VenterE03,
  author       = {H. S. Venter and
                  Jan H. P. Eloff},
  title        = {Evaluating vulnerability scanners using harmonised vulnerability categories},
  journal      = {South Afr. Comput. J.},
  volume       = {31},
  pages        = {40--45},
  year         = {2003},
  url          = {http://reference.sabinet.co.za/document/EJC27950},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/VenterE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics