Items where Kingston Author is "Hebbes, Luke"
Group by: Item Type | No Grouping Number of items: 15. Hebbes, Luke and Chan, Chris (2011) 2-Factor authentication with 2D Barcodes. In: International Symposium on Human Aspects of Information Security & Assurance; 7 - 8 July 2011, Kingston, U.K.. Alsop, Graham, Hebbes, Luke, Livingstone, David and Neve, Paul (2010) VLab: virtual machines as learning object for ICT teaching. In: ALT-C "Into something rich and strange” – making sense of the sea-change; 7 Sept - 9 Sept 2010, Nottingham, U.K.. Alsop, Graham, Hebbes, Luke, Livingstone, David and Neve, Paul (2010) VLab: virtual machines as learning objects for ICT teaching. In: ALT-C 2010 "Into something rich and strange" – making sense of the sea-change; 7-9 Sept 2010, Nottingham, UK. Hebbes, L., Janjua, F.Y., Livingstone, D. and Orwell, J. (2006) A steganographic method for the secure embedding of GIS data streams into aerial photography. In: Joint IST Workshop on Sensor Networks & Symposium on Trends in Communications; 24 - 27 Jun 2006, Bratislava, Slovakia. ISBN 1424403685 Onwubiko, C., Lenaghan, A.P. and Hebbes, L. (2006) An integrated security framework for assisting in the defence of computer networks. In: Joint IST Workshop on Mobile Future and the Symposium on Trends in Communications.; 24 - 27 Jun 2006, Bratislava, Slovakia. ISBN 1424403685 Onwubiko, Cyril, Lenaghan, Andrew P., Hebbes, Luke and Malyan, Ron R. (2005) The representation and use of relation information for the detection of threats by security information management systems. In: 1st European Conference on Computer Network Defence (EC2ND); Dec 2005, Pontypridd, Wales. ISBN 9781846283116 Hebbes, L., Malyan, R. and Lenaghan, A. (2005) Genetic algorithms for turbo codes. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Lenaghan, A., Onwubiko, C., Hebbes, L. and Malyan, R. (2005) Security spaces for protecting users of wireless public hotspots. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Onwubiko, C., Lenaghan, A. and Hebbes, L. (2005) An improved worm mitigation model for evaluating the spread of aggressive network worms. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Hebbes, Luke (2004) Turbo codes for real-time applications. (PhD thesis), Kingston University, . Hebbes, Luke and Lenaghan, Andrew (2004) A semi-fragile steganographic digital signature for images. In: Lopez, Javier , Qing, Sihan and Okamoto, Eiji, (eds.) Information and Communications Security. Berlin, Germany : Springer. pp. 271-275. (Lecture Notes in Computer Science, (3269)) ISSN (print) 0302-9743 ISBN 9783540235637 Hebbes, L. and Malyan, R. (2003) Turbo codes for low-power mobile devices. In: The International Conference on Computer as a Tool; 22- 24 Sep 2003, Ljubljana, Slovenia. (Region 8 EUROCON) ISBN 078037763X Farkas, P., Hoc, R. and Hebbes, L. (2002) On structured trellises of some best [n,k,d] codes. In: 5th International symposium on Wireless personal multimedia communications; 27 - 30 Oct 2002, Hawaii, U.S.A.. Hebbes, L., Malyan, R. and Ball, P. (2001) Computational complexities and the relative performance of turbo codes. In: International Conference on Trends in Communications; 04 Jul - 07 Jul 2001, Bratislava, Slovakia. (EUROCON) ISBN 0780364902 Hebbes, Luke (1998) A tyro's guide to - Microsoft Office 97, standard edition. ROBO Publishing. 170p. (A Tyro's Guide to) ISBN 9780953493005 |