@article { olivier2006,title = {Logical traffic isolation using differentiated services},journal = {IFIP International Federation for Information Processing},year = {2006},volume = {222},pages = {229-237},author = {Strauss, T. and Olivier, M. and Kourie, D.}}
2006
Privacy contracts incorporated in a privacy protection framework
@article { olivier2006,title = {Privacy contracts incorporated in a privacy protection framework},journal = {Computer Systems Science and Engineering},year = {2006},volume = {21},number = {1},pages = {5-16},author = {Oberholzer, H.J.G. and Olivier, M.S.}}
2006
Using image steganography for decryptor distribution
Morkel, T., Eloff, J.H.P., Olivier, M.S.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
@article { olivier2006,title = {Using image steganography for decryptor distribution},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2006},volume = {4277 LNCS - I},pages = {322-330},author = {Morkel, T. and Eloff, J.H.P. and Olivier, M.S.}}
2005
Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database
@article{Venter2005,title = {Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database},journal = {Proceedings of the 5th International Network Conference, INC 2005},year = {2005},pages = {377-384},author = {Venter, H.S. and Olivier, M.S. and Eloff, J.H.P. and Botes, M.E.}}
2005
Polar: Proxies collaborating to achieve anonymous web browsing
@article{Venter2005,title = {Polar: Proxies collaborating to achieve anonymous web browsing},journal = {Proceedings of the 5th International Network Conference, INC 2005},year = {2005},pages = {317-324},author = {Tillwick, H. and Neumann, T. and Olivier, M. and Venter, H. and Eloff, J.}}