Browse By Person: Foo, Ernest

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 86.

Book

Foo, Ernest & Stebila, Douglas (Eds.) (2015) Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Lecture Notes in Computer Science, 9144. Springer.

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. CRC for Construction Innovation, Brisbane.
Number of full-text downloads 1,266

Book Chapter

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2016) Enhancing privacy to defeat open source intelligence. In Layton, Robert & Watters, Paul A. (Eds.) Automating Open Source Intelligence. Elsevier, pp. 61-78.

Journal Article

Akande, Ayodeji, Fidge, Colin, & Foo, Ernest (2017) Limitations of passively mapping logical network topologies. International Journal of Computer Network and Information Security, 9(2).
Number of full-text downloads 19

Amoah, Raphael, Camtepe, Seyit, & Foo, Ernest (2016) Securing DNP3 broadcast communications in SCADA systems. IEEE Transactions on Industrial Informatics. (In Press)
Number of citations in Web of Science® 1

Davis, Jonathan J. & Foo, Ernest (2016) Automated feature engineering for HTTP tunnel detection. Computers & Security, 59, pp. 166-185.

Schmidt, Desmond, Radke, Kenneth, Camtepe, Seyit, Foo, Ernest, & Ren, Michal (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys, 48(4), Article No. 64.
Number of citations in Scopus 1

Djamaludin, Chris, Foo, Ernest, Camtepe, Seyit A., & Corke, Peter (2016) Revocation and update of trust in autonomous delay tolerant networks. Computers & Security, 60, pp. 15-36.

Amoah, Raphael, Camtepe, Seyit, & Foo, Ernest (2016) Formal modelling and analysis of DNP3 secure authentication. Journal of Network and Computer Applications, 59, pp. 345-360.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2015) Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security, 14(3), pp. 221-247.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Seifi, Y, Suriadi, S, Foo, E, & Boyd, C (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks, 9(2), pp. 85-103.

Djamaludin, Chris, Foo, Ernest, & Corke, Peter (2013) Establishing initial trust in autonomous delay tolerant networks without centralised PKI. Computers & Security.
Number of full-text downloads 106
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Abu-Nimeh, Saed, Foo, Ernest, Fovino, Igor Nai, Govindarasu, Manimaran, & Morris, Thomas (2013) Cyber security of networked critical infrastructures [Guest Editorial]. IEEE Network : The Magazine of Global Internetworking, 27(1), pp. 3-4.
Number of citations in Scopus 2

White, Andrew, Schatz, Bradley, & Foo, Ernest (2013) Integrity verification of user space code. Digital Investigation, S59-S68.
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 152
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Security and Communication Networks, 5(2), pp. 125-144.
Number of citations in Scopus 6
Number of citations in Web of Science® 5

White, Andrew, Schatz, Bradley, & Foo, Ernest (2012) Surveying the user space through user allocations. Digital Investigation: the international journal of digital forensics and incident response [The Proceedings of the 12th Annual DFRWS Conference], 9(Supple), S3-S12.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Park, Dong-Gook (2012) A taxonomy of secure data aggregation in wireless sensor networks. International Journal of Communication Networks and Distributed Systems, 8(1 - 2), pp. 101-148.
Number of citations in Scopus 8

Low, Rouhshi & Foo, Ernest (2009) The susceptibility of digital signatures to fraud in the National Electronic Conveyancing System : an analysis. Australian Property Law Journal, 17(3), pp. 303-325.
Number of full-text downloads 426

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 547
Number of citations in Scopus 32
Number of citations in Web of Science® 19

Boyd, Colin, Du, Rong, & Foo, Ernest (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 349
Number of citations in Scopus 7

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 676
Number of citations in Scopus 13
Number of citations in Web of Science® 15

Betts, Martin, Black, Peter, Christensen, Sharon A., Dawson, Edward, Du, Rong, Duncan, William, et al. (2006) Towards secure and legal e-tendering. Journal of Information Technology in Construction, 11, pp. 89-102.
Number of full-text downloads 1,310
Number of citations in Scopus 18

Foo, Ernest, Looi, Mark, & Tham, Wen Kaye (2006) Ubiquitous Authorization Scheme Based On Device Profile. Emerging Directions in Embedded and Ubiquitous Computing (LNCS 4097), 4097, pp. 312-321.

Conference Paper

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2017) Framework for SCADA cyber-attack dataset creation. In Australasian Computer Science Week Multiconference (ACSW'17), 30 January - 3 February 2017, Geelong, Vic. (Unpublished)

Myers, David, Radke, Kenneth, Suriadi, Suriadi, & Foo, Ernest (2017) Process discovery for industrial control system cyber attack detection. In IFIP Information Security & Privacy Conference 2017, 29-31 May 2017, Rome.
Number of full-text downloads 55

Rahman, Anisur, Xu, Yue, Radke, Kenneth, & Foo, Ernest (2016) Finding anomalies in SCADA logs using rare sequential pattern mining. In 10th International Conference on Network and System Security (NSS 2016), 28-30 September 2016, Taipei, Taiwan.
Number of full-text downloads 10

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2016) DNP3 network scanning and reconnaissance for critical infrastructure. In Australasian Information Security Conference (ACSW-AISC), 2-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 83
Number of citations in Scopus 1

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2015) Real-time and interactive attacks on DNP3 critical infrastructure using Scapy. In Welch, Ian & Yi, Xun (Eds.) Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Sydney, NSW.
Number of full-text downloads 463
Number of citations in Scopus 1

Akande, Ayodeji J., Fidge, Colin, & Foo, Ernest (2015) Component modeling for SCADA network mapping. In Parry, David (Ed.) Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 91-100.
Number of full-text downloads 82
Number of citations in Scopus 1

Myers, David, Foo, Ernest, & Radke, Kenneth (2015) Internet-wide scanning taxonomy and framework. In Welch, Ian & Yi, Xun (Eds.) Proceedings of Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Australian Computer Society, Inc, Sydney, NSW.
Number of full-text downloads 180

Foo, Ernest, Djamaludin, Christopher, & Rakotonirainy, Andry (2015) Security issues for future intelligent transport systems. In Proceedings of the 2015 Australasian Road Safety Conference, Gold Coast, Qld.
Number of full-text downloads 65

Amoah, Raphael, Suriadi, Suriadi, Camtepe, Seyit A., & Foo, Ernest (2014) Security analysis of the non-aggressive challenge response of the DNP3 Protocol using a CPN Model. In IEEE International Conference on Communications (ICC 2014), 10-14 June 2014, Sydney, NSW.
Number of full-text downloads 158
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Number of full-text downloads 165
Number of citations in Scopus 6

Bhatia, Sajal, Kush, Nishchal, Djamaludin, Chris, Akande, Ayodeji, & Foo, Ernest (2014) Practical Modbus flooding attack and detection. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 57-65.
Number of full-text downloads 279
Number of citations in Scopus 2

Alseadoon, Ibrahim Mohammed, Othman, Mohd Fairuz Iskandar, Foo, Ernest, & Chan, Taizan (2013) Typology of phishing email victims based on their behavioural response. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013), AIS Electronic Library (AISeL), Hilton Chicago, Chicago, IL, pp. 3716-3724.

Sitnikova, Elena, Foo, Ernest, & Vaughn, Rayford (2013) The power of hands-on exercises in SCADA cyber security education. In Dodge, R.C. & Futcher, L. (Eds.) IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, Auckland, New Zealand, pp. 83-94.
Number of citations in Scopus 3

Foo, Ernest, Branagan, Mark, & Morris, Thomas (2013) A proposed Australian industrial control system security curriculum. In Sprague, Jr., Ralph H. (Ed.) Proceedings of the 2013 46th Hawaii International Conference on System Sciences, IEEE, Wailea, Hawaii, pp. 1754-1762.
Number of citations in Scopus 3

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest , & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.
Number of full-text downloads 173

Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest, & Gonzalez Nieto, Juan M. (2012) Who is more susceptible to phishing emails? : a Saudi Arabian study. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, Victoria.
Number of citations in Scopus 3

Othman, Mohd Fairuz Iskandar, Chan, Taizan, & Foo, Ernest (2011) IT governance adoption in Malaysia : a preliminary investigation. In Australasian Conference on Information Systems (ACIS 2011), 29 November - 2 December 2011, Sydney Law School, Sydney, NSW.
Number of full-text downloads 482

Othman, Mohd Fairuz Iskandar, Chan, Taizan, Foo, Ernest, Nelson, Karen J., & Timbrell, Gregory T. (2011) Barriers to information technology governance adoption : a preliminary empirical investigation. In Soliman, Khalid S. (Ed.) Proceedings of 15th International Business Information Management Association Conference, Cairo, Egypt, pp. 1771-1787.
Number of full-text downloads 1,331

Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Number of full-text downloads 672

Low, Rouhshi, Burdon, Mark, Christensen, Sharon A., Duncan, William D., Barnes, Paul H., & Foo, Ernest (2010) Protecting the protectors : legal liabilities from the use of Web 2.0 for Australian disaster response. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society : Social Implications of Emerging Technologies, ISTAS 2010 Program Committee, University of Wollongong, New South Wales, pp. 411-418.
Number of full-text downloads 255
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., & Foo, Ernest (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Proceedings of The 24th International Conference on Advanced Information Networking and Applications, IEEE, Perth, Western Australia.
Number of full-text downloads 196
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa.
Number of full-text downloads 614
Number of citations in Scopus 6

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 162
Number of citations in Scopus 5
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Number of full-text downloads 270
Number of citations in Scopus 1

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand.
Number of full-text downloads 387
Number of citations in Scopus 25
Number of citations in Web of Science® 17

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan M. (2008) Secure Data Aggregation in Wireless Sensor Networks: A survey. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia, pp. 93-105.
Number of full-text downloads 4,563
Number of citations in Scopus 44
Number of citations in Web of Science® 17

Alzomai, Mohammed, Foo, Ernest, Josang, Audun, & McCullagh, Adrian (2008) Strengthening SMS-based authentication through usability. In Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, 10-12 December 2008, Australia, New South Wales, Sydney.
Number of citations in Scopus 7
Number of citations in Web of Science® 3

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 165
Number of citations in Scopus 6

Gauravaram, Praveen & Foo, Ernest (2007) Designing Secure e-Contracting Systems. In CollECTeR 2007 - 21st Conference on eCommerce / 10th Anniversary CollECTeR Australia conference, 9-11 December 2007, Melbourne.
Number of full-text downloads 557

Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Number of full-text downloads 187

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Number of full-text downloads 243
Number of citations in Scopus 3

Ring, Jared W., Foo, Ernest, & Looi, Mark H. (2007) A secure billing architecture for 4G wireless networks. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20th - 25th May 2007, Gold Coast, Qld..
Number of full-text downloads 471

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Nieto, Juan Gonzalez (2006) Examining the DOS Resistance to HIP. In Meersman, R. & Tari, Z. (Eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (LNCS 4277), 29 October - 3 November, Montpellier, France.
Number of full-text downloads 129

Du, Rong, Foo, Ernest, Boyd, Colin A., & Choo, Kim-Kwang R. (2006) Formal analysis of secure contracting protocol for E-Tendering. In Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 16 - 19 Jan 2006, Hobart, Australia.
Number of full-text downloads 272
Number of citations in Scopus 3

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 101

Ring, Jared W., Cho, Kim-Kwang R., Foo, Ernest, & Looi, Mark H. (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. In Clark, Andrew, McPherson, Mark, & Mohay, George (Eds.) AusCERT Asia Pacific Information Technology Security Conference 2006, 23 May 2006, Gold Coast, Australia.
Number of full-text downloads 880

Du, Rong, Boyd, Colin A., & Foo, Ernest (2006) A secure e-tender submission protocol. In Fischer-Hubner, S., Furnell, S., & Lambrinoudakis, C. (Eds.) Trust, Privacy, and Security in Digital Business, 5-7 September, Krakow, Poland.
Number of full-text downloads 310

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Du, Rong , Foo, Ernest , Boyd, Colin , & Fitzgerald, Brian F. (2004) Secure communication protocol for preserving E-tendering integrity. In Fifth Asia-Pacific Industrial Engineering and Management Systems Conference, 12-15 December 2004, Gold Coast, Australia.
Number of full-text downloads 488

Boyd, Colin, Du, Rong, Fitzgerald, Brian, & Foo, Ernest (2004) Defining Security Services for Electronic Tendering. In Hogan, J, Montague, P, Purvis, M, & Steketee, C (Eds.) Proceedings of the ACSW Workshop. The Australian Information Security Workshop (AISW2004)., January, 2004, Dunedin, New Zealand.
Number of full-text downloads 101

Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Dawson, Edward, Foo, Ernest, Peng, Kun, & Yao, Ming (2004) An Improved Forward Integrity Protocol for Mobile Agents. In Chae, K & Yung, M (Eds.) Information Security Applications. 4th International Workshop, WISA 2003, August 2003, Jeju Island, Korea.
Number of citations in Scopus 10
Number of citations in Web of Science® 3

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Maitland, Gregory, & Yao, Minna (2004) A Mobile Agent System Providing Offer Privacy. In Wang, Pieprzyk, & Varadharajan (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) A New Security Architecture for Protecting the Dynamic Component of Mobile Agents. In Mohammadian (Ed.) International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2004), 12 - 14 July 2004, Gold Coast, Australia.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. In Katsikas, Sokratis, Lopez, Javier, & Pernul, Gunther (Eds.) Trust and Privacy in Digital Business. First International Conference, TrustBus 2004, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Boyd, Colin, Du, Rong, Fitzgerald, Brian, & Foo, Ernest (2004) Secure Communications Protocol for Preserving E-Tendering Integrity. In Kozan, E (Ed.) Proceedings of The Fifth Asia-Pacific Industrial Engineering and Management Systems (APIEMS) Conference 2004, 12-15 December 2004, Gold Coast, Australia.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Peng, Kun, & Yao, Minna (2004) Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. In Bauknecht, Kurt, Bichler, Martin, & Proll, Birgit (Eds.) E-Commerce and Web Technologies - EC-Web 2004. Fifth International Conference Proceedings., 31 August - 3 September 2004, Zaragoza, Spain.
Number of citations in Scopus 2
Number of citations in Web of Science® 4

Liu, Vicky, Caelli, William J., Foo, Ernest, & Russell, Selwyn V. (2004) Visually Sealed and Digitally Signed Documents. In 27th Australasian Computer Science Conference, 19 - 23 January 2004, The University of Otago, Dunedin, New Zealand.
Number of full-text downloads 274

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 404
Number of citations in Scopus 4

Report

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 270

Kush, Nishchal, Clark, Andrew J., & Foo, Ernest (2010) Smart Grid Test Bed Design and Implementation. (Unpublished)
Number of full-text downloads 1,676

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 282
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 77

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 147

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 186
Number of citations in Web of Science® 1

Dawson, Ed , Christensen, Sharon, Duncan, William , Black, Peter J., Ernest Foo, Ernest , & Du, Rong (2005) Security and legal issues in E-tendering. CRC for Construction Innovation, Brisbane.
Number of full-text downloads 156

QUT Thesis

Foo, Ernest (2000) Strategies for designing efficient electronic payment schemes. PhD thesis, Queensland University of Technology.

Other

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Number of full-text downloads 1,043

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

This list was generated on Sun Jun 18 07:25:09 2017 AEST.