Items where Kingston Author is "Hebbes, Luke"

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 15.

Book

Hebbes, Luke (1998) A tyro's guide to - Microsoft Office 97, standard edition. ROBO Publishing. 170p. (A Tyro's Guide to) ISBN 9780953493005

Book Section

Hebbes, Luke and Lenaghan, Andrew (2004) A semi-fragile steganographic digital signature for images. In: Lopez, Javier , Qing, Sihan and Okamoto, Eiji, (eds.) Information and Communications Security. Berlin, Germany : Springer. pp. 271-275. (Lecture Notes in Computer Science, (3269)) ISSN (print) 0302-9743 ISBN 9783540235637

Conference or Workshop Item

Hebbes, Luke and Chan, Chris (2011) 2-Factor authentication with 2D Barcodes. In: International Symposium on Human Aspects of Information Security & Assurance; 7 - 8 July 2011, Kingston, U.K..

Alsop, Graham, Hebbes, Luke, Livingstone, David and Neve, Paul (2010) VLab: virtual machines as learning object for ICT teaching. In: ALT-C "Into something rich and strange” – making sense of the sea-change; 7 Sept - 9 Sept 2010, Nottingham, U.K..

Alsop, Graham, Hebbes, Luke, Livingstone, David and Neve, Paul (2010) VLab: virtual machines as learning objects for ICT teaching. In: ALT-C 2010 "Into something rich and strange" – making sense of the sea-change; 7-9 Sept 2010, Nottingham, UK.

Hebbes, L., Janjua, F.Y., Livingstone, D. and Orwell, J. (2006) A steganographic method for the secure embedding of GIS data streams into aerial photography. In: Joint IST Workshop on Sensor Networks & Symposium on Trends in Communications; 24 - 27 Jun 2006, Bratislava, Slovakia. ISBN 1424403685

Onwubiko, C., Lenaghan, A.P. and Hebbes, L. (2006) An integrated security framework for assisting in the defence of computer networks. In: Joint IST Workshop on Mobile Future and the Symposium on Trends in Communications.; 24 - 27 Jun 2006, Bratislava, Slovakia. ISBN 1424403685

Onwubiko, Cyril, Lenaghan, Andrew P., Hebbes, Luke and Malyan, Ron R. (2005) The representation and use of relation information for the detection of threats by security information management systems. In: 1st European Conference on Computer Network Defence (EC2ND); Dec 2005, Pontypridd, Wales. ISBN 9781846283116

Hebbes, L., Malyan, R. and Lenaghan, A. (2005) Genetic algorithms for turbo codes. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X

Lenaghan, A., Onwubiko, C., Hebbes, L. and Malyan, R. (2005) Security spaces for protecting users of wireless public hotspots. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X

Onwubiko, C., Lenaghan, A. and Hebbes, L. (2005) An improved worm mitigation model for evaluating the spread of aggressive network worms. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X

Hebbes, L. and Malyan, R. (2003) Turbo codes for low-power mobile devices. In: The International Conference on Computer as a Tool; 22- 24 Sep 2003, Ljubljana, Slovenia. (Region 8 EUROCON) ISBN 078037763X

Farkas, P., Hoc, R. and Hebbes, L. (2002) On structured trellises of some best [n,k,d] codes. In: 5th International symposium on Wireless personal multimedia communications; 27 - 30 Oct 2002, Hawaii, U.S.A..

Hebbes, L., Malyan, R. and Ball, P. (2001) Computational complexities and the relative performance of turbo codes. In: International Conference on Trends in Communications; 04 Jul - 07 Jul 2001, Bratislava, Slovakia. (EUROCON) ISBN 0780364902

Thesis

Hebbes, Luke (2004) Turbo codes for real-time applications. (PhD thesis), Kingston University, .

This list was generated on Mon Oct 14 05:43:02 2024 BST.