What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jan H. P. Eloff
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2018
journals/compsec
Cyber-security: Identity deception detection on social media platforms.
Estée van der Walt
Jan H. P. Eloff
Jacomine Grobler
2013
journals/compsec
Integrated digital forensic process model.
Michael D. Kohn
Mariki M. Eloff
Jan H. P. Eloff
2010
journals/compsec
A security privacy aware architecture and protocol for a single smart card used for multiple services.
A. Maciej Rossudowski
Hein S. Venter
Jan H. P. Eloff
Derrick G. Kourie
2010
journals/compsec
A framework and assessment instrument for information security culture.
Adéle da Veiga
Jan H. P. Eloff
2010
journals/compsec
Editorial.
Dimitris Gritzalis
Jan H. P. Eloff
2009
journals/compsec
Adapting usage control as a deterrent to address the inadequacies of access controls.
Keshnee Padayachee
Jan H. P. Eloff
2009
journals/compsec
Information security: The moving target.
M. T. Dlamini
Jan H. P. Eloff
Mariki M. Eloff
2009
journals/compsec
Building access control models with attribute exploration.
Sergei A. Obiedkov
Derrick G. Kourie
Jan H. P. Eloff
2008
journals/compsec
Standardising vulnerability categories.
Hein S. Venter
Jan H. P. Eloff
Y. L. Li
2008
journals/compsec
SMSSec: An end-to-end protocol for secure SMS.
Johnny Li-Chang Lo
Judith Bishop
Jan H. P. Eloff
2007
conf/sec
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis.
A. Maciej Rossudowski
Hein S. Venter
Jan H. P. Eloff
2006
journals/compsec
Uncovering identities: A study into VPN tunnel fingerprinting.
Vafa D. Izadinia
Derrick G. Kourie
Jan H. P. Eloff
2006
conf/sec
A Framework for Web Services Trust.
Marijke Coetzee
Jan H. P. Eloff
2004
journals/compsec
Vulnerability forecasting - a conceptual model.
H. S. Venter
Jan H. P. Eloff
2004
journals/compsec
Towards Web Service access control.
Marijke Coetzee
Jan H. P. Eloff
2003
journals/compsec
Security and human computer interfaces.
J. Johnston
Jan H. P. Eloff
Les Labuschagne
2003
journals/compsec
A taxonomy for information security technologies.
H. S. Venter
Jan H. P. Eloff
2003
conf/sec
Information Security Management System: Processes and Products.
Mariki M. Eloff
Jan H. P. Eloff
2002
journals/compsec
A Prototype for Assessing Information Technology Risks in Health Care.
Elmé Smith
Jan H. P. Eloff
2002
journals/compsec
Vulnerabilities categories for intrusion detection system.
H. S. Venter
Jan H. P. Eloff
2002
journals/compsec
Information security policy what do international information security standards say?
Karin Höne
Jan H. P. Eloff
2002
conf/sec
Information Security Culture.
A. Martins
Jan H. P. Eloff
2002
conf/sec
Secure Database Connectivity on the WWW.
Marijke Coetzee
Jan H. P. Eloff
2002
conf/sec
Human Computer Interaction: An Information Security Perspectives.
Mariki M. Eloff
Jan H. P. Eloff
2001
journals/compsec
Access Control in Document-centric Workflow Systems An Agent-based Approach.
Reinhardt A. Botha
Jan H. P. Eloff
2001
journals/compsec
A Framework for the Implementation of Socio-ethical Controls in Information Security.
Colette M. Trompeter
Jan H. P. Eloff
2000
conf/sec
A Context-Sensitive Access Control Model and Prototype Implementation.
Damian G. Cholewka
Reinhardt A. Botha
Jan H. P. Eloff
2000
conf/sec
MASS: Model for an Auditing Security System.
Alida Liebenberg
Jan H. P. Eloff
1998
journals/compsec
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
H. S. Venter
Jan H. P. Eloff
1998
journals/compsec
The use of real-time risk analysis to enable dynamic activation of countermeasures.
Les Labuschagne
Jan H. P. Eloff
1998
journals/compsec
Software source code, visual risk analysis: an example.
Gert van der Merwe
Jan H. P. Eloff
1997
journals/compsec
Improved system-access control using complementary technologies.
Les Labuschagne
Jan H. P. Eloff
1997
conf/sec
A methodology for accrediting a commercial distributed database.
Jan H. P. Eloff
R. Körner
1997
conf/sec
A common criteria framework for the evaluation of information technology systems security.
R. Kruger
Jan H. P. Eloff
1996
journals/compsec
Risk analysis modelling with the use of fuzzy logic.
Willem G. de Ru
Jan H. P. Eloff
1996
journals/compsec
Security classification for documents.
Jan H. P. Eloff
Ralph Holbein
Stephanie Teufel
1996
conf/sec
Activating dynamic counter measures to reduce risk.
Les Labuschagne
Jan H. P. Eloff
1995
journals/compsec
Classification of objects for improved access control.
H. A. S. Booysen
Jan H. P. Eloff
1994
journals/compsec
TOPM: a formal approach to the optimization of information technology risk management.
Karin P. Badenhorst
Jan H. P. Eloff
1993
journals/compsec
A comparative framework for risk analysis methods.
Jan H. P. Eloff
Les Labuschagne
Karin P. Badenhorst
1993
conf/sec
International Standards and Organizational Security Needs: Bridging the Gap.
C. J. Bosch
Jan H. P. Eloff
John M. Carroll
1993
conf/acsac
Improved password mechanisms through expert system technology.
Willem G. de Ru
Jan H. P. Eloff
1990
journals/compsec
Computer security methodology: Risk analysis and project definition.
Karin P. Badenhorst
Jan H. P. Eloff
1989
journals/compsec
Framework of a methodology for the life cycle of computer security in an organization.
Karin P. Badenhorst
Jan H. P. Eloff
1988
journals/compsec
Computer security policy: Important issues.
Jan H. P. Eloff
1985
journals/compsec
The development of a specification language for a computer security system.
Jan H. P. Eloff
1983
journals/compsec
Selection process for security packages.
Jan H. P. Eloff
Coauthors
A. Maciej Rossudowski
(2)
A. Martins
(1)
Adéle da Veiga
(1)
Alida Liebenberg
(1)
C. J. Bosch
(1)
Colette M. Trompeter
(1)
Damian G. Cholewka
(1)
Derrick G. Kourie
(3)
Dimitris Gritzalis
(1)
Elmé Smith
(1)
Estée van der Walt
(1)
Gert van der Merwe
(1)
H. A. S. Booysen
(1)
H. S. Venter
(4)
Hein S. Venter
(3)
J. Johnston
(1)
Jacomine Grobler
(1)
Jan H. P. Eloff
(47)
John M. Carroll
(1)
Johnny Li-Chang Lo
(1)
Judith Bishop
(1)
Karin Höne
(1)
Karin P. Badenhorst
(4)
Keshnee Padayachee
(1)
Les Labuschagne
(5)
M. T. Dlamini
(1)
Marijke Coetzee
(3)
Mariki M. Eloff
(4)
Michael D. Kohn
(1)
R. Körner
(1)
R. Kruger
(1)
Ralph Holbein
(1)
Reinhardt A. Botha
(2)
Sergei A. Obiedkov
(1)
Stephanie Teufel
(1)
Vafa D. Izadinia
(1)
Willem G. de Ru
(2)
Y. L. Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to