@article{RID:0814170417403-40,
title = {A security privacy aware architecture and protocol for a single smart card used for multiple services},
journal = {Computers & Security},
year = {2010},
author = {Rossudowski, A. M. and Venter, H. S. and Eloff, J. H. P. and Kourie, D. G.},
volume = {29},
number = {4},
pages = {393-409}
}
2010
Adding digital forensic readiness to the email trace header
@article{Venter2010,title = {Adding digital forensic readiness to the email trace header},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Van Staden, F.R. and Venter, H.S.}}
2010
Information privacy in two dimensions towards a classification scheme for information privacy research
@article{Venter2010,title = {Information privacy in two dimensions towards a classification scheme for information privacy research},journal = {Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust},year = {2010},pages = {973-980},author = {Reddy, K. and Venter, H.S.}}
@article{Venter2010,title = {Social engineering attack detection model: SEADM},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Bezuidenhout, M. and Mouton, F. and Venter, H.S.}}