Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Number of items at this level: 91.

Book

Jung, Hoe-Kyung, Tae Kim, Jung, Sahama, Tony, & Yang, Chung-Huang (Eds.) (2013) Future Information Communication Technology and Applications : ICFICE 2013. Lecture Notes in Electrical Engineering, 235. Springer, Germany Berlin Heidelberg.

Journal Article

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Alhaqbani, Bandar S. & Fidge, Colin J. (2007) Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops, 4928, pp. 371-382.
Number of full-text downloads 792
Number of citations in Scopus 13

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Number of full-text downloads 182
Number of citations in Scopus 42
Number of citations in Web of Science® 38

Boyd, Colin, Cliff, Yvonne, & Tin, Yiu (2006) Password Based Server Aided Key Exchange. Applied Cryptography and Network Security (LNCS), 3989, pp. 146-161.
Number of full-text downloads 138
Number of citations in Scopus 7
Number of citations in Web of Science® 7

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 189
Number of citations in Scopus 9

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 150
Number of citations in Scopus 14
Number of citations in Web of Science® 11

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 207
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 21
Number of citations in Web of Science® 13

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 66
Number of citations in Scopus 2

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Number of citations in Scopus 4
Number of citations in Web of Science® 4

Caelli, William (2007) Application Security - Myth or Reality? Lecture Notes in Computer Science, 4464, pp. 1-10.

Caelli, William, Gaskell, Gary, Kwok, Lam For, & Longley, Dennis (2006) A Model to Support Information Security Governance. Information Risk Management & Audit Journal, 16(1), pp. 7-24.

Choo, Kim (2005) Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security, 1(3), pp. 154-159.
Number of citations in Scopus 17

Choo, Kim (2006) Revisiting Lee, Kim & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security (IJNS), 2(1), pp. 64-68.

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Dawson, Edward, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Vivas, Jose (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 18
Number of citations in Web of Science® 14

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 196
Number of citations in Scopus 4
Number of citations in Web of Science® 6

Liu, Vicky (2005) Seal Culture Still Remains in Electronic Commerce. M/C: a journal of media and culture, 8(2).
Number of full-text downloads 432

Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2008) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. electronic Journal of Health Informatics, 3(1), pp. 1-14.

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 18
Number of citations in Web of Science® 7

Rae, Andrew & Fidge, Colin J. (2005) Identifying Critical Components During Information Security Evaluations. Journal of Research and Practice in Information Technology, 37(4), pp. 391-402.
Number of full-text downloads 200
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Seyfi, Majid, Rawat, Rakesh, Weligamage, Justin, & Nayak, Richi (2013) A data analytics case study assessing factors affecting pavement deflection values. International Journal of Business Intelligence and Data Mining, 8(3), pp. 199-226.
Number of full-text downloads 152

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 349
Number of citations in Scopus 7

Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD threshold cryptography with an application to RSA key recovery. Lecture Notes in Computer Science, 3574, pp. 394-405.
Number of full-text downloads 265
Number of citations in Scopus 2

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 546
Number of citations in Scopus 31
Number of citations in Web of Science® 19

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 675
Number of citations in Scopus 11
Number of citations in Web of Science® 15

Wiliem, Leonard, Hargreaves, Douglas J., Stapelberg, Rudolph F., & Yarlagadda, Prasad K. (2007) Development of Real-Time Data Filtering for SCADA System. Journal of Achievements in Materials and Manufacturing Engineering, 21(2), pp. 89-92.
Number of full-text downloads 699

Conference Paper

Agudo, Isaac, Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005, July 2005, Greece, Samos Island.

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 408
Number of citations in Scopus 6

Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Cheung, W & Hsu, J (Eds.) Proceedings: The 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service, 29 March - 1 April, 2005, China, Hong Kong.
Number of citations in Scopus 1

Bannon, David, Chhabra, Rajesh, Coddington, Paul, Cox, Daniel, Crawford, Frank, Francis, Rhys, et al. (2006) Experiences with a grid gateway architecture using virtual machines. In First International Workshop on Virtualization Technology in Distributed Computing, 17 November, Tampa, Florida.
Number of full-text downloads 379
Number of citations in Scopus 2

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 384
Number of citations in Scopus 4

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 539
Number of citations in Scopus 8
Number of citations in Web of Science® 7

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 39
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 138
Number of citations in Scopus 15
Number of citations in Web of Science® 8

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 57
Number of citations in Scopus 1

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 21

Caelli, William & Holford, John (2006) The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.

Caelli, William & McCullagh, Adrian (2005) Who Goes There? Internet Banking: A Matter of Risk and Reward. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Chan, Zim, Croll, Peter, Hansen, David, & Maeder, Anthony (2006) The Use of Agent Technologies for Preserving Privacy with Health Records when Linking Federated Databases. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Choudhury, Sharmin, Pham, Binh L., Smith, Robert, & Higgs, Peter L. (2007) Loculus : a metadata wrapper for digital motion pictures. In Internet and Multimedia Systems and Applications, 20-22 August 2007, Honolulu, Hawaii.
Number of full-text downloads 287
Number of citations in Scopus 2

Clark, Andrew, Giansiracusa, Michelangelo, Hynd, John, & Russell, Selwyn (2005) An Improved Execution Integrity Solution for Mobile Agents. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jacob (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Cliff , Yvonne, Lee, Sanggon, Moon, Sang-Jae, & Park, Youngho (2006) Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of citations in Web of Science® 2

Croll, Jasmine & Croll, Peter (2006) Privacy Compliance - Managing the Risks when Integrating Health Data. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Number of full-text downloads 124

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 206
Number of citations in Scopus 1

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 7
Number of citations in Web of Science® 16

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 87
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Scopus 1

Dowling, Jason A., Planitz, Birgit M., Maeder, Anthony J., Du, Jiang, Pham, Binh L., Boyd, Colin A., et al. (2007) Visual quality assessment of watermarked medical images. In Jiang, Yulei & Sahiner, Berkman (Eds.) Medical Imaging 2007: Image Perception, Observer Performance, and Technology Assessment: SPIE (Vol. 6515): Progress in Biomedical Optics and Imaging, 21-22 February 2007, San Diego, CA, USA.
Number of full-text downloads 419

Fidge, Colin J. & McComb, Tim (2006) Tracing secure information flow through mode changes. In Estivill-Castro, V. & Dobbie, G. (Eds.) 29th Australasian Computer Science Conference (ACSC 2006), 16-19 January 2006, Hobart.
Number of full-text downloads 112
Number of citations in Scopus 2

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 302
Number of citations in Scopus 12

Holford, John W., Caelli, William J., & Rhodes, Anthony W. (2003) The Concept of Self-Defending Objects in the Development of Security Aware Applications. In 4th Australian Information Warfare and IT Security Conference, 20-21 November 2003, Adelaide, Australia.
Number of full-text downloads 310

Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 729
Number of citations in Scopus 52

Li, Yuefeng, Liu, Hang, Xu, Yue, & Yang, Wanzhong (2006) Rough Set Model for Constraint-based Multi-dimensional Association Rule Mining. In Li, Y, Looi, M, & Zhong, N (Eds.) Advances in Intelligent IT: Active Media Technology 2006, 7-9 June 2006, Australia, Queensland, Brisbane.

Liu, Vicky, Caelli, William J., Foo, Ernest, & Russell, Selwyn V. (2004) Visually Sealed and Digitally Signed Documents. In 27th Australasian Computer Science Conference, 19 - 23 January 2004, The University of Otago, Dunedin, New Zealand.
Number of full-text downloads 274

Liu, Vicky, Caelli, William J., May, Lauren J., & Croll, Peter R. (2008) Open Trusted Health Informatics Structure(OTHIS). In Yu, Ping, Warren, James R., Yearwood, John, & Patrick, Jon (Eds.) Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 22nd - 25th January 2008, University of Wollongong NSW Australia.
Number of full-text downloads 328

Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2007) A Sustainable Approach to Security and Privacy in Health Information Systems. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, Dave (Eds.) 18th Australasian Conference on Information Systems, 5-7 December, Toowoomba, Qld, Australia.
Number of full-text downloads 487
Number of citations in Scopus 3

Long, Benjamin W., Fidge, Colin J., & Carrington, David A. (2007) Cross-Layer Verification of Type Flaw Attacks on Security Protocols. In Dobbie, Gillian (Ed.) 30th Australasian Computer Science Conference (ACSC 2007), January 2007, Ballarat.
Number of full-text downloads 253
Number of citations in Scopus 6

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 404
Number of citations in Scopus 4

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,210

Mathew, Avin D. & Ma, Lin (2007) Multidimensional schemas for engineering asset management. In World Congress on Engineering Asset Management 2007, 11-14 June 2007, Harrogate, England. (Unpublished)
Number of full-text downloads 937

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 23
Number of citations in Web of Science® 2

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Moores, Matthew T. & Leggett, Kevin (2005) Integrating XSL-FO with Enterprise Reporting. In 11th Australasian World Wide Web Conference, 2nd to 6th July 2005, Royal Pines Resort, Gold Coast, Australia.
Number of full-text downloads 2,064

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 327

Peng, Kun & Dawson, Edward P. (2007) A range test secure in the active adversary model. In Brankovic, L. & Steketee, C. (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Victoria.
Number of full-text downloads 80
Number of citations in Scopus 5

Pham, Quan, McCullagh, Adrian J., & Dawson, Edward P. (2007) Consistency of user attribute in federated systems. In Lambrinoudakis, Costas, Pernul, Gunther, & Min Tjoa, A. (Eds.) Lecture Notes in Computer Science, Springer, Regensburg, Germany, pp. 165-177.
Number of full-text downloads 129
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Number of full-text downloads 597

Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.
Number of full-text downloads 1,108
Number of citations in Scopus 18

Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Number of full-text downloads 548
Number of citations in Scopus 22
Number of citations in Web of Science® 5

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 594

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 691
Number of citations in Scopus 27
Number of citations in Web of Science® 6

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller, Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07), Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 2,103
Number of citations in Scopus 89

Reid, Jason F., Senadji, Bouchra, & Tang, Tee G. (2005) Security Considerations for Conducted and Radiated Emissions. In Asia Pacific Symposium on EMC Taipei - APEMC 2005, Taipei, Taiwan.
Number of full-text downloads 638

Ring, Jared W., Foo, Ernest, & Looi, Mark H. (2007) A secure billing architecture for 4G wireless networks. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20th - 25th May 2007, Gold Coast, Qld..
Number of full-text downloads 470

Ross, David A., Clark, Andrew J., & Looi, Mark H. (2007) Securely deploying IEEE 802.11 WLANs. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld..
Number of full-text downloads 624
Number of citations in Scopus 6

Russell, Selwyn (2006) Combining Commercial Networks for Optimum Large Scale Emergency Communications: Challenges and Opportunities. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, 19 - 21 September 2006, Australia, Australian Capital Territory, Canberra.

Smith, Jason, Gill, Rupinder S., & Clark, Andrew J. (2006) On Securing Wireless LAN Access to Government Information Systems. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) 2006 RNSA Security Technology Conference – Recent advances in security technology, September 21, 2006, Canberra, Australia.
Number of full-text downloads 995

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 101

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 164
Number of citations in Scopus 6

Conference Item

Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.
Number of full-text downloads 167

Other

Borchert, Martin & Young, Joseph A. (2011) Developing research data management services at QUT. (Unpublished)
Number of full-text downloads 191

This list was generated on Sun May 21 10:17:55 2017 AEST.