Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400)"
|Up a level|
- Subjects classification (46975)
- Australian and New Zealand Standard Research Classification (46975)
Group by: Authors/Creators | Item Type
Number of items at this level: 37.
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2015) Flaws in the initialisation process of stream ciphers. In Daras, Nicholas & Rassias, Michael (Eds.) Computation, Cryptography, and Network Security. Springer International Publishing, Cham, Switzerland, pp. 19-49.
Kutty, Sangeetha, Nayak, Richi, & Tran, Tien (2011) A Study of XML models for data mining : representations, methods, and issues. In Tagarelli, Andrea (Ed.) XML Data Mining : Models, Methods, and Applications. IGI Global Publishing, Hershey, PA, pp. 1-28.
Abdel-Hafez, Ahmad, Xu, Yue, & Josang, Audun (2015) A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence, 13(1), pp. 43-51.
Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Barth, Adam, Rubinstein, Benjamin I.P., Sundararajan, Mukund, Mitchell, John C., Song, Dawn, & Bartlett, Peter L. (2010) A learning-based approach to reactive security. Financial Cryptography and Data Security, 6052, pp. 192-206.
Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Chen, Lin & Nayak, Richi (2012) Leveraging the network information for evaluating answer quality in a collaborative question answering portal. Social Network Analysis and Mining, 2(3), pp. 197-215.
Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Green, Peter, Rosemann, Michael, Indulska, Marta, & Manning, Chris (2007) Candidate Interoperability Standards: An Ontological Overlap Analysis. Data and Knowledge Engineering, 62(2), pp. 274-291.
Gupta, Gaurav & Pieprzyk, Josef (2009) Database relation watermarking resilient against secondary watermarking attacks. Lecture Notes in Computer Science : Information Systems Security, 5905, pp. 222-236.
Nayak, Richi (2011) Utilizing past relations and user similarities in a social matching system. Lecture Notes in Computer Science : Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference Proceedings, Part II, pp. 99-110.
Nayak, Richi & Pitt, Ellen (2011) Assessment of cardiovascular disease risk prediction models: Evaluation methods. Lecture Notes in Computer Science : Database Systems for Advanced Applications: 16th International Conference Proceedings, Part II, pp. 377-387.
Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry (2013) Security analysis of linearly filtered NLFSRs. Journal of Mathematical Cryptology, 7(4), pp. 313-332.
Peng, Kun, Dawson, Ed , & Bao, Feng (2011) Modification and optimisation of a shuffling scheme : stronger security, formal analysis and higher efficiency. International Journal of Information Security, 10(1), pp. 33-47.
Pipanmaekaporn, Luepol & Li, Yuefeng (2011) Mining a data reasoning model for personalized text classification. IEEE Intelligent Informatics Bulletin, 12(1), pp. 17-24.
Stebila, Douglas & Theriault, Nicolas (2006) Unified point addition formula and side-channel attacks. Lecture Notes in Computer Science, 4249, pp. 354-368.
Tao, Daniel, Li, Yuefeng, & Zhong, Ning (2011) A Personalized Ontology Model for Web Information Gathering. IEEE Transactions on Knowledge & Data Engineering, 23(4), pp. 496-511.
Trotman, Andrew, Geva, Shlomo, Kamps, Jaap, Lalmas, Mounia, & Murdock, Vanessa (2010) Current research in focused retrieval and result aggregation. Information Retrieval, 13(5), pp. 407-411.
Zhou, Xujuan, Li, Yuefeng, Bruza, Peter, Xu, Yue, & Lau, Raymond (2011) Pattern mining for a two-stage information filtering system. Lecture Notes in Computer Science : Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference Proceedings, Part I, pp. 363-374.
ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Abdel-Hafez, Ahmad, Xu, Yue, & Josang, Audun (2015) An accurate rating aggregation method for generating item reputation. In The 2015 IEEE International Conference on Data Science and Advanced Analytics (IEEE DSAA'2015), 19-21 October 2015, Paris, France.
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Bhartiya, Vishesh & Simpson, Leonie (2016) Initialisation flaws in the A5-GMR-1 satphone encryption algorithm. In Australasian Computer Science Week Multiconference (ACSC2016), 2-5 February 2016, Canberra, A.C.T.
Contini, Scott, Steinfeld, Ron, Pieprzyk, Josef, & Matusiewicz, Krystian (2008) A critical look at cryptographic hash function literature. In Li, Yongqing, Ling, San, Niederreiter, Harald, Wang, Huaxiong, Xing, Chaoping, & Zhang, Shengyuan (Eds.) Proceedings of the First International Workshop on Coding and Cryptology, World Scientific Publishing, Wuyi Mountain, Fujian, China, pp. 58-79.
Gonzalez Nieto, Juan M., Manulis, Mark, & Sun, Dongdong (2012) Forward-secure hierarchical predicate encryption. In Abdalla, Michel & Lange, Tanja (Eds.) Proceedings of the 5th International Conference on Pairing-Based Cryptography, Springer, Cologne, Germany.
Gupta, Gaurav & Pieprzyk, Josef (2008) Source code watermarking based on function dependency oriented sequencing. In Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.) Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08), IEEE Computer Society, Harbin, China, pp. 965-968.
Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan (2009) Robust and reversible numerical set watermarking. In Fernández-Medina, Eduardo , Malek, Manu , & Hernando , Javier (Eds.) Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009), INSTICC Press, Portugal , Milan, Italy, pp. 141-148.
Lai, C.L., Xu, K.Q., Lau, Raymond, Li, Yuefeng, & Jing, L. (2010) Toward a language modeling approach for consumer review spam detection. In Lau, F, Chung, J-Y, & Shah, N (Eds.) Proceedings of the 2010 IEEE International Conference on E-Business Engineering, 10 - 12 November, 2010, China.
McDonald, Cameron, Charnes, Chris, & Pieprzyk, Josef (2008) An algebraic analysis of trivium ciphers based on the boolean satisfiability problem. In Masnyk-Hansen, Olga, Michon, Jean-Francis, Valarcher, Pierre, & Yunes, Jean-Baptiste (Eds.) Proceedings of the 4th International Workshop on Boolean Functions : Cryptography and Applications, Copenhagen, Denmark, pp. 173-184.
Nepal, Madhav Prasad, Zhang, J., Webster, A., Staub-French, S., Pottinger, R., & Lawrence, M. (2009) Querying IFC-based building information models to support construction management functions. In Ariaratnam, Samuel T. & Rojas, Eddy M. (Eds.) Construction Research Congress 2009, American Society of Civil Engineers, Seattle, Wash., pp. 506-515.
Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2008) A fair e-tendering protocol. In Fernández-Medina, Eduardo (Ed.) Proceedings of the International Conference on Security and Cryptography, Institute for Systems and Technologies of Information, Control and Communication, Porto, Portugal, pp. 294-299.
Pieprzyk, Josef, Wang, Huaxiong, & Zhang, Xian-Mo (2008) MöBIUS-α commutative functions and partially coincident functions. In Masnyk-Hansen, Olga, Michon, Jean-Francis, Valarcher, Pierre, & Yunès, Jean-Baptiste (Eds.) Proceedings of the Fourth International Workshop on Boolean Functions : Cryptography and Applications, Rouen University Press, Copenhagen, Denmark, pp. 135-150.
Sahama, Tony, Simpson, Leonie, & Lane, Bill (2013) Security and privacy in eHealth : is it possible? A sociotechnical analysis. In Rodrigues, Joel Rodrigue (Ed.) 15th International Conference on e-Health Networking, Applications and Services, 9 -12 October 2013, Lisbon, Portugal.
Suchanek, Fabian, Varde, Aparna, Nayak, Richi, & Senellart, Pierre (2011) The hidden Web, XML and the Semantic Web: Scientific data management perspectives. In Ailamaki, A, Amer-Yahia, S, Patel, J, Risch, T, Senellart, P, & Stoyanovich, J (Eds.) Proceedings of the 14th International Conference on Extending Database Technology, 22 - 24 March, 2011, Sweden.
Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
van Prooijen, Marvin W. (2006) Metadata: Development, deployment and diffusion. In Edwards, Sylvia L. (Ed.) 1st Annual Web Content Management Symposium: C3 Create Clarify Connect, 3rd June 2006, Queensland University of Technology, Brisbane.
Sahama, Tony (2003) Some practical issues in the design and analysis of computer experiments. PhD thesis, Victoria University, Melbourne.