Database last updated on May 11, 2026, 8 a.m. with a total of 461 publications sourced from ORCID.
Publications
Showing page 77 of 93 with a total of 461 Publications
Bibtex
Refine By Author
Refine By Type
Refine By Year
2006
Information leakage in ubiquitous voice-over-IP communications
Neumann, T., Tillwick, H., Olivier, M.S.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
@article { olivier2006,title = {Information leakage in ubiquitous voice-over-IP communications},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2006},volume = {4083 LNCS},pages = {233-242},author = {Neumann, T. and Tillwick, H. and Olivier, M.S.}}
2006
Logical Traffic Isolation Using Differentiated Services
@incollection{Strauss_2006,doi = {10.1007/0-387-36891-4_18},url = {http://dx.doi.org/10.1007/0-387-36891-4_18},year = 2006,publisher = {Springer Science $\mathplus$ Business Media},pages = {229--237},author = {Tinus Strauss and Martin Olivier and Derrick Kourie},title = {Logical Traffic Isolation Using Differentiated Services},booktitle = {{IFIP} Advances in Information and Communication Technology}}
2006
Logical traffic isolation using differentiated services
@article { olivier2006,title = {Logical traffic isolation using differentiated services},journal = {IFIP International Federation for Information Processing},year = {2006},volume = {222},pages = {229-237},author = {Strauss, T. and Olivier, M. and Kourie, D.}}
2006
Privacy contracts incorporated in a privacy protection framework
@article { olivier2006,title = {Privacy contracts incorporated in a privacy protection framework},journal = {Computer Systems Science and Engineering},year = {2006},volume = {21},number = {1},pages = {5-16},author = {Oberholzer, H.J.G. and Olivier, M.S.}}
2006
Using image steganography for decryptor distribution
Morkel, T., Eloff, J.H.P., Olivier, M.S.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
@article { olivier2006,title = {Using image steganography for decryptor distribution},journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},year = {2006},volume = {4277 LNCS - I},pages = {322-330},author = {Morkel, T. and Eloff, J.H.P. and Olivier, M.S.}}