Browse By Person: Looi, Mark
|Up a level|
Group by: Item Type | Date
Number of items: 36.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware rate-adaptive beaconing for efficient and scalable vehicular safety communication. International Journal of Communications, Network and System Sciences, 5(9), pp. 534-547.
Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99.
Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Foo, Ernest, Looi, Mark, & Tham, Wen Kaye (2006) Ubiquitous Authorization Scheme Based On Device Profile. Emerging Directions in Embedded and Ubiquitous Computing (LNCS 4097), 4097, pp. 312-321.
Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Intrusion detection system for encrypted networks using secret-sharing schemes. In International Journal of Cryptology Research, Malaysian Society for Cryptology Research, Hotel Equatorial, Melaka, Malaysia.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2010) A multicast routing scheme for efficient safety message dissemination in VANET. In Proceedings of 2010 IEEE Wireless Communications and Networking Conference, IEEE eXpress Conference Publishing, Sydney.
Abdullah, Noraswaliza, Xu, Yue, Geva, Shlomo, & Looi, Mark (2010) Enhancement of infrequent purchased product recommendation using data mining techniques. In Bramer, M (Ed.) Artificial Intelligence in Theory and Practice III: proceedings of the 3rd IFIP International Conference on Artificial Intelligence in Theory and Practice, held as part of the 21st IFIP World Computer Congress 2010, 20 - 23 September, 2010, Australia.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2009) Multi-vehicles interaction graph model for cooperative collision warning system. In Intelligent Vehicles Symposium, 2009 IEEE, IEEE, Kempinski Hotel, Xi'an, pp. 929-934.
Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark H. (2009) Towards intrusion detection for encrypted networks. In 2009 International Conference on Availability, Reliability and Security, 16-19 March 2009, Fukuoka Institute of Technology, Fukuoka.
Wang, Charles, Feng, Yanming, Higgins, Matthew, & Looi, Mark (2009) Communication infrastructure study for precise positioning services in regional Queensland. In Proceedings of International Global Navigation Satellite Systems Society Symposium, IGNSS, Holiday Inn Hotel, Gold Coast, Queensland.
Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Ross, David A., Clark, Andrew J., & Looi, Mark H. (2007) Securely deploying IEEE 802.11 WLANs. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld..
Ring, Jared W., Foo, Ernest, & Looi, Mark H. (2007) A secure billing architecture for 4G wireless networks. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20th - 25th May 2007, Gold Coast, Qld..
Ring, Jared W., Cho, Kim-Kwang R., Foo, Ernest, & Looi, Mark H. (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. In Clark, Andrew, McPherson, Mark, & Mohay, George (Eds.) AusCERT Asia Pacific Information Technology Security Conference 2006, 23 May 2006, Gold Coast, Australia.
Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Cheung, W & Hsu, J (Eds.) Proceedings: The 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service, 29 March - 1 April, 2005, China, Hong Kong.
Caelli, William, Holford, John, Looi, Mark, & Vasanta, Hari (2004) Architecture for Securing Critical Infrastructure Using Content-Aware Self-Defending Objects. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.
Wullems, Christian, Tham, Wen, & Looi, Mark (2004) Proximity-Based Network Packet Filtering for IEEE 802.11 Wireless Devices. In Guimaraes, N & Isaias, P (Eds.) Proceedings of the IADIS International Conference 2004, March 23-26 2004, Lisbon, Portugal.
Boyd, Colin, Gonzalez-Nieto, Juan, Looi, Mark, Tin, Yiu, & Vasanta, Hari (2004) A Secure Framework for User Privacy in Heterogenous Location Networks. In Karmouch, A, Korba, L, & Madeira, E (Eds.) Mobility Aware Technologies and Applications, 20-22 October 2004, Florianopolis, Brazil.
Looi, Mark, Russell, Selwyn, & Smith, Jason (2004) Security as a Safety Issue in Rail Communications. In Lindsay, Peter & Cant, Tony (Eds.) Safety Critical Systems and Software 2003. Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (SCS03), October 2003, Canberra, Australia.
Wullems, Christian J., Looi, Mark Hanmeng, & Clark, Andrew J. (2004) Towards Context-Aware Security: An Authorization Architecture for Intranet Environments. In Werner, B. (Ed.) Pervasive Computing and Communications, Proceedings Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 14-17 March, Orlando, Florida, USA.
Wullems, Christian, Tham, Kevin, Smith, Jason, & Looi, Mark (2004) A Trivial Denial of Service Attack on IEEE 802.11 Direct Sequence Spread Spectrum Wireless LANs. In Powell, S (Ed.) Wireless Telecommunications Symposium, 2004, IEEE, Pomona, California, USA, pp. 129-136.
Au, Wai, Choo, Kim, Looi, Mark, & Vasanta, Hari (2004) A User-Centric Anonymous Authorisation Framework in E-Commerce Environment. In Sixth International Confernece on Electronic Commerce, ICEC04: Towards a New Serices Landscape, 25-27 October 2004, Delft, The Netherlands.
Wullems, Christian, Vasanta, Hari, Looi, Mark, & Clark, Andrew J. (2004) A broadcast authentication and integrity augmentation for trusted differential GPS in marine navigation. In Dawson, E. & Klemm, W. (Eds.) In Workshop on Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, QLD.
Au, Wai, Looi, Mark, & Yao, Minna (2003) Agent-Based Privilege Negotiation for E-Commerce on World Wide Web. In J, Lovelle, B, Rodriguez, & et al, Aguilar (Eds.) Web Engineering - ICWE 2003, July 2003, Oviedo, Spain.
Wullems, Christian J., Looi, Mark H., & Clark, Andrew J. (2003) Enhancing the security of Internet applications using location : a new model for tamper-resistant GSM location. In Proceedings of the Eighth IEEE International Symposium on Computers and Communication, 30 June - 3 July 2003, Antalya, Turkey.
Wullems, Christian, Pozzobon, Oscar, Looi, Mark, & Kubik, Kurt (2003) Enhancing the trust of location acquisition systems for critical applications and location-based security services. In Slay, Jill (Ed.) Proceedings : 4th Australian Information Warfare & IT Security Conference - Enhancing Trust, University of South Australia, Adelaide, South Australia, pp. 391-406.
Au, Wai, Looi, Mark, & Yao, Minna (2003) Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. In 2003 IEEE/WIC International Conference on Intelligent Agent Technology, 13-16 October, 2003, Halifax, Canada.
Ashley, Paul, Au, Wai, Looi, Mark, & Seet, Loo (2002) Secure Authorisation Agent for Cross-Domain Access Control in Mobile Computing Environment. In Kim, Kwangjo (Ed.) Information Security and Cryptology - ICISC 2001, 6-7 December, 2001, Seoul, Korea.
Ashley, Paul, Au, Wai, Looi, Mark, & Yao, Minna (2002) Secure Client Agent Environment for World Wide Web. In Bauknecht, Min Tjoa, & Quirchmayr (Eds.) E-Commerce and eb Technologies, 2-6 September, 2002, Aix-en-Provence, France.
Ashley, Paul, Au, Wai, & Looi, Mark (2001) Automated Cross-Organisational Trust Establishment on Extranets. In Proceedings of the Workshop on Information Technology for Virtual Enterprises ITVE 2001, 29-30 January 2001.
Looi, Mark (2001) Enhanced Authentication Services for Internet Systems Using Mobile Networks. In GLOBECOM 2001 (Volume 6), 25-29 November 2001.
Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Looi, Mark H (1995) Authentication for applications in computer network environments using intelligent tokens. PhD thesis, Queensland University of Technology.