QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Computational Logic and Formal Languages (080203)"

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Number of items at this level: 10.

Journal Article

Boyd, Colin, Du, Rong, & Foo, Ernest (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 1

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 193
Number of citations in Scopus 5

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 112

van der Aalst, Wil M., Dumas, Marlon, Gottschalk, Florian, ter Hofstede, Arthur H.M., La Rosa, Marcello, & Mendling, Jan (2008) Preserving correctness during business process model configuration. Formal Aspects of Computing, 22(3-4), pp. 459-482.
Number of full-text downloads 426
Number of citations in Scopus 32

van der Aalst, Wil M.P., Lohmann, Niels, & La Rosa, Marcello (2012) Ensuring Correctness During Process Configuration via Partner Synthesis. Information Systems, 37(6), pp. 574-592.
Number of full-text downloads 33
Number of citations in Scopus 7
Number of citations in Web of Science® 3

Conference Paper

Jafari, Mohammad, Fong, Philip W. L., Safavi-Naini, Rei, Barker, Ken, & Sheppard, Nicholas P. (2011) Towards defining semantic foundations for purpose-based privacy policies. In Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY '11), ACM, Hilton Palacio Del Rio, San Antonio, Texas, pp. 213-224.
Number of full-text downloads 62
Number of citations in Scopus 7

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 2

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1

Report

Song, Liang, Jianmin, Wang, ter Hofstede, Arthur H.M., La Rosa, Marcello, Ouyang, Chun, & Wen, Lijie (2011) A semantics-based approach to querying process model repositories. (Submitted (not yet accepted for publication))
Number of full-text downloads 68

This list was generated on Sat Sep 27 09:20:09 2014 EST.