@article { olivier2008,title = {Preservation of privacy in thwarting the ballot stuffing scheme},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2008},volume = {5185 LNCS},pages = {195-204},author = {Brandi, W. and Olivier, M.S. and Zugenmaier, A.}}
2008
Toward a model of responsibility for proactive systems
@article { olivier2008,title = {Toward a model of responsibility for proactive systems},journal = {Journal of Information Ethics},year = {2008},volume = {17},number = {2},pages = {78-90},author = {Venter, S.L. and Olivier, M.S. and Britz, J.J.}}
2008
Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy
@article { olivier2008,title = {Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy},journal = {Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008},year = {2008},pages = {56-64},author = {Reddy, K. and Venter, H.S. and Olivier, M. and Currie, I.}}
2008
Using Sensor Dirt for Toolmark Analysis of Digital Photographs
@article { olivier2008,title = {Using Sensor Dirt for Toolmark Analysis of Digital Photographs},journal = {IFIP International Federation for Information Processing},year = {2008},volume = {285},pages = {193-206},author = {Olivier, M.}}
2008
On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location
South African Computer Journal
@article{falsepos, author= {Martin S Olivier}, title= {On the Probability of a False Positive Match for Digital Camera Identification based on Sensor Dirt Location}, journal= {South African Computer Journal}, volume= {41}, pages= {21--28}, year= {2008}, url= {https://hdl.handle.net/10520/EJC28064}}