default search action
Larry Korba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [c50]Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin Wang, Larry Korba, Hongyu Liu, Yunli Wang:
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining. ISMIS 2009: 442-452 - 2008
- [j15]Ronggong Song, Larry Korba, George O. M. Yee:
A Scalable Group Key Management Protocol. IEEE Commun. Lett. 12(7): 541-543 (2008) - [j14]George O. M. Yee, Larry Korba:
Security Personalization for Internet and Web Services. Int. J. Web Serv. Res. 5(1): 1-23 (2008) - [c49]Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, Hongyu Liu, Yonghua You:
Using Data Mining Methods to Predict Personally Identifiable Information in Emails. ADMA 2008: 272-281 - [c48]Liqiang Geng, Larry Korba, Yunli Wang, Xin Wang, Yonghua You:
Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions. Canadian AI 2008: 108-113 - [c47]George O. M. Yee, Larry Korba, Ronggong Song:
Cooperative Visualization of Privacy Risks. CDVE 2008: 45-53 - [c46]Larry Korba, Yunli Wang, Liqiang Geng, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Hongyu Liu, Yonghua You:
Private Data Discovery for Privacy Compliance in Collaborative Environments. CDVE 2008: 142-150 - [c45]Liqiang Geng, Hao Wang, Xin Wang, Larry Korba:
Adapting LDA Model to Discover Author-Topic Relations for Email Analysis. DaWaK 2008: 337-346 - [c44]Ronggong Song, Larry Korba, George Yee:
An Efficient Privacy-Preserving Data Mining Platform. DMIN 2008: 480-486 - [c43]Hongyu Liu, Evangelos E. Milios, Larry Korba:
Exploiting Multiple Features with MEMMs for Focused Web Crawling. NLDB 2008: 99-110 - [c42]George O. M. Yee, Larry Korba, Ronggong Song:
Assessing the Likelihood of Privacy Policy Compliance. SEC 2008: 723-727 - [e3]Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini:
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada. IEEE Computer Society 2008, ISBN 978-0-7695-3390-2 [contents] - 2007
- [j13]Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:
Protect Virtual Property in Online Gaming System. Int. J. Softw. Eng. Knowl. Eng. 17(4): 483-496 (2007) - [j12]Larry Korba, Ronggong Song, George Yee:
Privacy Rights Management: Implementation Scenarios. Inf. Resour. Manag. J. 20(1): 14-27 (2007) - [c41]Ronggong Song, Larry Korba, George Yee:
Privacy Rights Management for Privacy Compliance Systems. AINA Workshops (1) 2007: 620-625 - [c40]Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Yunli Wang, Liqiang Geng:
Private Data Management in Collaborative Environments. CDVE 2007: 88-96 - [c39]Ronggong Song, Larry Korba, George Yee:
Analysis of Smart Card-Based Remote User Authentication Schemes. Security and Management 2007: 323-329 - [c38]Liqiang Geng, Howard J. Hamilton, Larry Korba:
Expectation Propagation in GenSpace Graphs for Summarization. DaWaK 2007: 449-458 - [c37]Ronggong Song, Larry Korba, George Yee:
Privacy management system using social networking. SMC 2007: 3327-3332 - 2006
- [j11]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. Perform. Evaluation 63(11): 1094-1109 (2006) - [c36]George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for E-Health Services. ARES 2006: 321-328 - [c35]George Yee, Larry Korba, Ronggong Song, Ying-Chieh Chen:
Towards Designing Secure Online Games. AINA (2) 2006: 44-48 - [c34]Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick:
Automated Social Network Analysis for Collaborative Work. CDVE 2006: 1-8 - [c33]George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for Buyer-Seller E-Commerce. SEC 2006: 13-24 - 2005
- [j10]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Comput. Commun. 28(10): 1193-1203 (2005) - [j9]George Yee, Larry Korba:
Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business. Int. J. E Bus. Res. 1(1): 54-69 (2005) - [j8]George Yee, Larry Korba, Nigel H. Lin, Timothy K. Shih:
Context-aware privacy and security agents for distance education. Int. J. High Perform. Comput. Netw. 3(5/6): 395-404 (2005) - [j7]Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba, Ronggong Song, George Yee:
An analysis of online gaming crime characteristics. Internet Res. 15(3): 246-261 (2005) - [j6]Yuefei Xu, Ronggong Song, Larry Korba, Lihui Wang, Weiming Shen, Sherman Y. T. Lang:
Distributed device networks with security constraints. IEEE Trans. Ind. Informatics 1(4): 217-225 (2005) - [c32]George Yee, Larry Korba:
An Agent Architecture for e-Services Privacy Policy Compliance. AINA 2005: 374-379 - [c31]Larry Korba, Yuefei Xu, Ronggong Song, George Yee:
Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering. CDVE 2005: 140-148 - [c30]Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:
Protection of Virtual Property in Online Gaming. DMS 2005: 119-124 - [c29]Ronggong Song, Larry Korba, George Yee:
Agent-based Transactions for Home Energy Services. DMS 2005: 367-372 - [c28]George Yee, Larry Korba:
Negotiated Security Policies for E-Services and Web Services. ICWS 2005: 605-612 - [c27]George Yee, Larry Korba:
Context-Aware Security Policy Agent for Mobile Internet Services. INTELLCOMM 2005: 249-259 - [c26]Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba:
Online Gaming Cheating and Security Issue. ITCC (1) 2005: 518-523 - [c25]George Yee, Larry Korba:
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. PST 2005 - [c24]Ronggong Song, Larry Korba, George Yee:
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. SASN 2005: 33-42 - 2004
- [c23]Nigel H. Lin, Larry Korba, George Yee, Timothy K. Shih, Hsiau Wen Lin:
Security and Privacy Technologies for Distance Education Applications. AINA (1) 2004: 580-586 - [c22]Ronggong Song, Larry Korba:
Scalability of Agent-Based Onion Routing Network. CATA 2004: 65-69 - [c21]George Yee, Larry Korba:
Privacy Policy Compliance for Web Services. ICWS 2004: 158-165 - [c20]Ronggong Song, Larry Korba:
How to Make E-cash with Non-Repudiation and Anonymity. ITCC (2) 2004: 167-172 - [c19]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. LCN 2004: 618-624 - [c18]Larry Korba, Ronggong Song:
Scalability, Security Technologies and Mobile Applications. MATA 2004: 217-223 - [c17]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
A novel solution for achieving anonymity in wireless ad hoc networks. PE-WASUN 2004: 30-38 - [c16]Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba:
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. PST 2004: 131-136 - [e2]Ahmed Karmouch, Larry Korba, Edmundo Roberto Mauro Madeira:
Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florianópolis, Brazil, October 20-22, 2004, Proceedings. Lecture Notes in Computer Science 3284, Springer 2004, ISBN 3-540-23423-3 [contents] - 2003
- [j5]Ronggong Song, Larry Korba:
Cryptanalysis of scalable multicast security protocol. IEEE Commun. Lett. 7(11): 561-563 (2003) - [j4]Khalil El-Khatib, Larry Korba, Yuefei Xu, George Yee:
Privacy and Security in E-Learning. Int. J. Distance Educ. Technol. 1(4): 1-19 (2003) - [j3]Ronggong Song, Larry Korba:
Pay-TV system with strong privacy and non-repudiation protection. IEEE Trans. Consumer Electron. 49(2): 408-413 (2003) - [c15]George Yee, Larry Korba:
Future Interactions in Policy-Driven Privacy Management. FIW 2003: 231-238 - [c14]Khalil El-Khatib, Larry Korba, Ronggong Song, George Yee:
Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks. ICPP Workshops 2003: 359-366 - [c13]George Yee, Larry Korba:
Bilateral E-services Negotiation Under Uncertainty. SAINT 2003: 352-355 - [e1]Rino Falcone, K. Suzanne Barber, Larry Korba, Munindar P. Singh:
Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers. Lecture Notes in Computer Science 2631, Springer 2003, ISBN 3-540-00988-4 [contents] - 2002
- [j2]Steve Kenny, Larry Korba:
Applying digital rights management systems to privacy rights management. Comput. Secur. 21(7): 648-664 (2002) - [c12]Larry Korba, Steve Kenny:
Towards Meeting the Privacy Challenge: Adapting DRM. Digital Rights Management Workshop 2002: 118-136 - [c11]Larry Korba:
Privacy in Distributed Electronic Commerce. HICSS 2002: 306 - [c10]Ronggong Song, Larry Korba:
Anonymous Internet Communication Based on IPSec. Communication Systems: The State of the Art (IFIP World Computer Congress) 2002: 199-214 - [c9]Larry Korba, Ronggong Song, George Yee:
Anonymous Communications for Mobile Agents. MATA 2002: 171-181 - 2001
- [c8]Larry Korba:
Towards Distributed Privacy for CSCW. CSCWD 2001: 95-101 - [c7]Punnarumol Temdee, Larry Korba:
Of Networks, Interactions and Agents: An Approach for Social Network Analysis. CSCWD 2001: 324-329 - 2000
- [c6]Larry Korba, Fuhua Lin:
Towards Policy-Driven Agent Development and Management. MATA 2000: 115-128 - [c5]Fuhua Lin, Larry Korba:
Incorporating communication monitoring and control facility in multi-agent systems. SMC 2000: 3116-3121
1990 – 1999
- 1999
- [c4]Larry Korba:
Towards Secure Agent Distribution and Communication. HICSS 1999 - [c3]Larry Korba:
Towards Securing Network Management Agent Distribution and Communication. Integrated Network Management 1999: 715-728 - 1998
- [c2]Larry Korba:
Security system for wireless local area networks. PIMRC 1998: 1550-1554 - 1994
- [c1]Larry Korba:
Variable Aperture Sonar for Mobile Robots. ICRA 1994: 3136-3141
1980 – 1989
- 1983
- [j1]Peter Nelson, Larry Korba, Gordon Park, David Crabtree:
The MOD Keyboard. IEEE Micro 3(4): 7-17 (1983)
Coauthor Index
aka: George O. M. Yee
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint