QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)"

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Jump to: NULL | A | B | C | D | F | G | H | J | L | M | P | R | S | T | W
Number of items at this level: 92.

NULL

Jung, Hoe-Kyung, Tae Kim, Jung, Sahama, Tony, & Yang, Chung-Huang (Eds.) (2013) Future Information Communication Technology and Applications : ICFICE 2013. Lecture Notes in Electrical Engineering, 235. Springer, Germany Berlin Heidelberg.

A

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Agudo, Isaac, Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005, July 2005, Greece, Samos Island.

Alhaqbani, Bandar S. & Fidge, Colin J. (2007) Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops, 4928, pp. 371-382.
Number of full-text downloads 453
Number of citations in Scopus 4

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 333
Number of citations in Scopus 1

Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Cheung, W & Hsu, J (Eds.) Proceedings: The 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service, 29 March - 1 April, 2005, China, Hong Kong.
Number of citations in Scopus 1

B

Bannon, David, Chhabra, Rajesh, Coddington, Paul, Cox, Daniel, Crawford, Frank, Francis, Rhys, et al. (2006) Experiences with a grid gateway architecture using virtual machines. In First International Workshop on Virtualization Technology in Distributed Computing, 17 November, Tampa, Florida.
Number of full-text downloads 279

Borchert, Martin & Young, Joseph A. (2011) Developing research data management services at QUT. (Unpublished)
Number of full-text downloads 123

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Number of full-text downloads 96
Number of citations in Scopus 22
Number of citations in Web of Science® 24

Boyd, Colin, Cliff, Yvonne, & Tin, Yiu (2006) Password Based Server Aided Key Exchange. Applied Cryptography and Network Security (LNCS), 3989, pp. 146-161.
Number of full-text downloads 97
Number of citations in Scopus 6
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 214
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 153
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 138
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 18
Number of citations in Scopus 2
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 64
Number of citations in Scopus 12
Number of citations in Web of Science® 10

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 108
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 67
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 33

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 10
Number of citations in Web of Science® 13

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Web of Science® 2

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 41
Number of citations in Scopus 1

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 4

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

C

Caelli, William (2007) Application Security - Myth or Reality? Lecture Notes in Computer Science, 4464, pp. 1-10.

Caelli, William, Gaskell, Gary, Kwok, Lam For, & Longley, Dennis (2006) A Model to Support Information Security Governance. Information Risk Management & Audit Journal, 16(1), pp. 7-24.

Caelli, William & Holford, John (2006) The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.

Caelli, William & McCullagh, Adrian (2005) Who Goes There? Internet Banking: A Matter of Risk and Reward. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Web of Science® 1

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Chan, Zim, Croll, Peter, Hansen, David, & Maeder, Anthony (2006) The Use of Agent Technologies for Preserving Privacy with Health Records when Linking Federated Databases. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Choo, Kim (2005) Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security, 1(3), pp. 154-159.
Number of citations in Scopus 15

Choo, Kim (2006) Revisiting Lee, Kim & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security (IJNS), 2(1), pp. 64-68.

Choudhury, Sharmin, Pham, Binh L., Smith, Robert, & Higgs, Peter L. (2007) Loculus : a metadata wrapper for digital motion pictures. In Internet and Multimedia Systems and Applications, 20-22 August 2007, Honolulu, Hawaii.
Number of full-text downloads 225

Clark, Andrew, Giansiracusa, Michelangelo, Hynd, John, & Russell, Selwyn (2005) An Improved Execution Integrity Solution for Mobile Agents. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jakub (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Cliff , Yvonne, Lee, Sanggon, Moon, Sang-Jae, & Park, Youngho (2006) Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.

Croll, Jasmine & Croll, Peter (2006) Privacy Compliance - Managing the Risks when Integrating Health Data. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Number of full-text downloads 90

D

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 119
Number of citations in Scopus 1

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 35
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Vivas, Jose (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Dowling, Jason A., Planitz, Birgit M., Maeder, Anthony J., Du, Jiang, Pham, Binh L., Boyd, Colin A., et al. (2007) Visual quality assessment of watermarked medical images. In Jiang, Yulei & Sahiner, Berkman (Eds.) Medical Imaging 2007: Image Perception, Observer Performance, and Technology Assessment: SPIE (Vol. 6515): Progress in Biomedical Optics and Imaging, 21-22 February 2007, San Diego, CA, USA.
Number of full-text downloads 356

F

Fidge, Colin J. & McComb, Tim (2006) Tracing secure information flow through mode changes. In Estivill-Castro, V. & Dobbie, G. (Eds.) 29th Australasian Computer Science Conference (ACSC 2006), 16-19 January 2006, Hobart.
Number of full-text downloads 74
Number of citations in Scopus 1

G

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 239
Number of citations in Scopus 1

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 142
Number of citations in Scopus 3
Number of citations in Web of Science® 4

H

Holford, John W., Caelli, William J., & Rhodes, Anthony W. (2003) The Concept of Self-Defending Objects in the Development of Security Aware Applications. In 4th Australian Information Warfare and IT Security Conference, 20-21 November 2003, Adelaide, Australia.
Number of full-text downloads 252

J

Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 485
Number of citations in Scopus 8

L

Li, Yuefeng, Liu, Hang, Xu, Yue, & Yang, Wanzhong (2006) Rough Set Model for Constraint-based Multi-dimensional Association Rule Mining. In Li, Y, Looi, M, & Zhong, N (Eds.) Advances in Intelligent IT: Active Media Technology 2006, 7-9 June 2006, Australia, Queensland, Brisbane.

Liu, Vicky (2005) Seal Culture Still Remains in Electronic Commerce. M/C: a journal of media and culture, 8(2).
Number of full-text downloads 334

Liu, Vicky, Caelli, William J., Foo, Ernest, & Russell, Selwyn V. (2004) Visually Sealed and Digitally Signed Documents. In 27th Australasian Computer Science Conference, 19 - 23 January 2004, The University of Otago, Dunedin, New Zealand.
Number of full-text downloads 240

Liu, Vicky, Caelli, William J., May, Lauren J., & Croll, Peter R. (2008) Open Trusted Health Informatics Structure(OTHIS). In Yu, Ping, Warren, James R., Yearwood, John, & Patrick, Jon (Eds.) Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 22nd - 25th January 2008, University of Wollongong NSW Australia.
Number of full-text downloads 254

Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.
Number of full-text downloads 131

Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2008) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. electronic Journal of Health Informatics, 3(1), pp. 1-14.

Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2007) A Sustainable Approach to Security and Privacy in Health Information Systems. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, Dave (Eds.) 18th Australasian Conference on Information Systems, 5-7 December, Toowoomba, Qld, Australia.
Number of full-text downloads 393

Long, Benjamin W., Fidge, Colin J., & Carrington, David A. (2007) Cross-Layer Verification of Type Flaw Attacks on Security Protocols. In Dobbie, Gillian (Ed.) 30th Australasian Computer Science Conference (ACSC 2007), January 2007, Ballarat.
Number of full-text downloads 208

M

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 259

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,054

Mathew, Avin D. & Ma, Lin (2007) Multidimensional schemas for engineering asset management. In World Congress on Engineering Asset Management 2007, 11-14 June 2007, Harrogate, England. (In Press)
Number of full-text downloads 755

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 13

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Moores, Matthew T. & Leggett, Kevin (2005) Integrating XSL-FO with Enterprise Reporting. In 11th Australasian World Wide Web Conference, 2nd to 6th July 2005, Royal Pines Resort, Gold Coast, Australia.
Number of full-text downloads 1,389

P

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 253

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Peng, Kun & Dawson, Edward P. (2007) A range test secure in the active adversary model. In Brankovic, L. & Steketee, C. (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Victoria.
Number of full-text downloads 51

Pham, Quan, McCullagh, Adrian J., & Dawson, Edward P. (2007) Consistency of user attribute in federated systems. In Lambrinoudakis, Costas, Pernul, Gunther, & Min Tjoa, A. (Eds.) Lecture Notes in Computer Science, Springer, Regensburg, Germany, pp. 165-177.
Number of full-text downloads 111
Number of citations in Scopus 2
Number of citations in Web of Science® 1

R

Rae, Andrew & Fidge, Colin J. (2005) Identifying Critical Components During Information Security Evaluations. Journal of Research and Practice in Information Technology, 37(4), pp. 391-402.
Number of full-text downloads 185
Number of citations in Scopus 5

Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Number of full-text downloads 502

Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.
Number of full-text downloads 913
Number of citations in Scopus 3

Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Number of full-text downloads 424
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 445

Reid, Jason F., Gonzalez Neito, Juan M., Tang, Tee, & Senadji, Bouchra (2006) Detecting Relay Attacks with Timing Based Protocols. .
Number of full-text downloads 1,960

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 468
Number of citations in Web of Science® 2

Reid, Jason F., Senadji, Bouchra, & Tang, Tee G. (2005) Security Considerations for Conducted and Radiated Emissions. In Asia Pacific Symposium on EMC Taipei - APEMC 2005, Taipei, Taiwan.
Number of full-text downloads 550

Ring, Jared W., Foo, Ernest, & Looi, Mark H. (2007) A secure billing architecture for 4G wireless networks. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20th - 25th May 2007, Gold Coast, Qld..
Number of full-text downloads 143

Ross, David A., Clark, Andrew J., & Looi, Mark H. (2007) Securely deploying IEEE 802.11 WLANs. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld..
Number of full-text downloads 487

Russell, Selwyn (2006) Combining Commercial Networks for Optimum Large Scale Emergency Communications: Challenges and Opportunities. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, 19 - 21 September 2006, Australia, Australian Capital Territory, Canberra.

S

Seyfi, Majid, Rawat, Rakesh, Weligamage, Justin, & Nayak, Richi (2013) A data analytics case study assessing factors affecting pavement deflection values. International Journal of Business Intelligence and Data Mining, 8(3), pp. 199-226.
Number of full-text downloads 23

Smith, Jason, Gill, Rupinder S., & Clark, Andrew J. (2006) On Securing Wireless LAN Access to Government Information Systems. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) 2006 RNSA Security Technology Conference – Recent advances in security technology, September 21, 2006, Canberra, Australia.
Number of full-text downloads 886

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 191
Number of citations in Scopus 5

Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD threshold cryptography with an application to RSA key recovery. Lecture Notes in Computer Science, 3574, pp. 394-405.
Number of full-text downloads 214

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 426
Number of citations in Scopus 23
Number of citations in Web of Science® 14

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-centric Protocol for Conditional Anonymity Revocation. (In Press)
Number of full-text downloads 141

T

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 69

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 127

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 614
Number of citations in Scopus 6
Number of citations in Web of Science® 9

W

Wiliem, Leonard, Hargreaves, Douglas J., Stapelberg, Rudolph F., & Yarlagadda, Prasad K. (2007) Development of Real-Time Data Filtering for SCADA System. Journal of Achievements in Materials and Manufacturing Engineering, 21(2), pp. 89-92.
Number of full-text downloads 548

This list was generated on Sat Aug 16 08:55:52 2014 EST.