A case study on ICT security in a developing country.pdf (948.6 KB)
A model based on the Direct–Control Cycle.pdf (215.6 KB)
A secure extension of the Kwak–Moon group signcryption scheme.pdf (292.3 KB)
Decoding digital rights management.pdf (113.2 KB)
Infection, imitation and a hierarchy of computer viruses.pdf (161.9 KB)
Information security culture.pdf (95.6 KB)
Microsoft's new window on security.pdf (93.6 KB)
Phishing for user security awareness.pdf (529.3 KB)
Simple three-party key exchange protocol.pdf (216.9 KB)
Theoretical reflections on agile development methodologies.pdf (138.9 KB)
Value-focused assessment of ICT security awareness in an academic environment.pdf (215.7 KB)
Information security governance.pdf (133.1 KB)