@article{Olivier2011,title = {Steganographic techniques for hiding data in SWF files},journal = {IFIP Advances in Information and Communication Technology},year = {2011},volume = {361},pages = {245-255},author = {Fouche, M.-A. and Olivier, M.}}
@article{Venter2010,title = {A forensic readiness model for wireless networks},journal = {IFIP Advances in Information and Communication Technology},year = {2010},volume = {337 AICT},pages = {107-118},author = {Ngobeni, S. and Venter, H. and Burke, I.}}
2010
A security privacy aware architecture and protocol for a single smart card used for multiple services
@article{RID:0814170417403-40,
title = {A security privacy aware architecture and protocol for a single smart card used for multiple services},
journal = {Computers & Security},
year = {2010},
author = {Rossudowski, A. M. and Venter, H. S. and Eloff, J. H. P. and Kourie, D. G.},
volume = {29},
number = {4},
pages = {393-409}
}
2010
Adding digital forensic readiness to the email trace header
@article{Venter2010,title = {Adding digital forensic readiness to the email trace header},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Van Staden, F.R. and Venter, H.S.}}
2010
Information privacy in two dimensions towards a classification scheme for information privacy research
@article{Venter2010,title = {Information privacy in two dimensions towards a classification scheme for information privacy research},journal = {Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust},year = {2010},pages = {973-980},author = {Reddy, K. and Venter, H.S.}}