Past > Institutes > Information Security Institute

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items at this level: 596.

Book/Report

Bruce, Christine, Mohay, George, Smith, Glenn, Stoodley, Ian, & Tweedale, Robyn (Eds.) (2006) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, United States of America, California, Santa Rosa.

, Abanmi, Suhail, Kanhere, Salil, & Chou, Chun Tung (2006) Detecting Wormhole Attacks in Wireless Sensor Networks. (Unpublished)
Number of full-text downloads 24

, , , , , , & (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation - CRC, Australia, Queensland, Brisbane.
Number of full-text downloads 1,589

Chapter in Book, Report or Conference volume

, Bell, Jim, , De Vel, Olivier, & (2006) Automated Recognition of Event Scenarios for Digital Forensics. In Liebrock, N (Ed.) Proceedings of the 2006 ACM Symposium on Applied Computing. ACM Press, United States of America, pp. 293-300.
Number of citations in Scopus 15

, , , & (2010) Enhancement of infrequent purchased product recommendation using data mining techniques. In Bramer, M (Ed.) Artificial Intelligence in Theory and Practice III: proceedings of the 3rd IFIP International Conference on Artificial Intelligence in Theory and Practice, held as part of the 21st IFIP World Computer Congress 2010. Springer, Germany, pp. 57-66.
Number of citations in Scopus 4

Agudo, Isaac, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005. University of the Aegean, Greece, pp. 157-164.

, , , & (2010) Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A R, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security. IEEE Computer Society, United States, pp. 1-6.
Number of full-text downloads 279
Number of citations in Scopus 3

, , & (2009) Characterising anamolous events using change-point correlation on unsolicited network traffic. In Josang, A, Maseng, T, & Knapskog, S (Eds.) Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Proceedings [Lecture Notes in Computer Science, Vol 5838]. Springer, Germany, pp. 104-119.
Number of full-text downloads 508
Number of citations in Scopus 3
Number of citations in Web of Science® 1

, , & (2009) Effective change detection in large repositories of unsolicited traffic. In Popescu, M, Georgescu, S, & Heikkinen, S (Eds.) Proceedings of the 4th International Conference on Internet Monitoring and Protection. IEEE Computer Society, United States, pp. 1-6.
Number of full-text downloads 321
Number of citations in Scopus 15

, , & (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In Li, M, Cao, J, Liu, H, Weng, C, Wang, X, Tang, H, et al. (Eds.) Proceedings of IFIP International Conference on Network and Parallel Computing Workshops. IEEE Computer Society, United States, pp. 168-175.
Number of full-text downloads 956
Number of citations in Scopus 34
Number of citations in Web of Science® 27

, , , & (2010) Use of IP addresses for high rate flooding attack detection. In Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330]. Springer, Germany, pp. 124-135.
Number of full-text downloads 585
Number of citations in Scopus 17
Number of citations in Web of Science® 7

, Lhee, Kyung-Suk, Shin, Hyun-Jung, & Hong, Man-Pyo (2011) Fast content-based file type identification. In Shenoi, S & Peterson, G (Eds.) Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361]. Springer, Germany, pp. 65-76.
Number of citations in Scopus 26

& (2010) Mutual protection in a cloud computing environment. In Chen, J, Xiang, Y, & Xhafa, F (Eds.) Proceedings 2010 12th IEEE International Conference on High Performance Computing and Communications. IEEE Computer Society, United States, pp. 641-646.
Number of full-text downloads 584
Number of citations in Scopus 31

, , , & (2010) Vulnerabilities in personal firewalls caused by poor security usability. In Fan, P & Yuan, D (Eds.) Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security. Institute of Electrical and Electronics Engineers Inc., United States, pp. 682-688.
Number of citations in Scopus 10

, , , & (2011) Dealing with the problem of cybercrime. In Baggili, I (Ed.) Digital Forensics and Cyber Crime: Second International ICST Conference Revised Selected Papers [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2011, Volume 53]. Springer, Germany, pp. 1-18.
Number of full-text downloads 2,469
Number of citations in Scopus 12

, , , & (2010) Money laundering and FATF compliance by the international community. In Hilty, L, Berleur, J, & Herscheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328]. Springer, Germany, pp. 86-97.
Number of full-text downloads 1,237
Number of citations in Scopus 1
Number of citations in Web of Science® 1

, , , & (2010) A comparative analysis of the extent of money laundering in Australia, UAE, UK and USA. In Balachandran, B (Ed.) Proceedings of the 1st Finance and Corporate Governance Conference 2010. Social Science Research Network, Australia, pp. 1-13.

& (2009) A proposed framework for understanding information security culture and practices in the Saudi context. In Bolan, C (Ed.) Proceedings of the 7th Australian Information Security Management Conference. secau, Edith Cowan University, Australia, pp. 6-17.
Number of full-text downloads 818
Number of citations in Scopus 34

, , & (2008) RSDA: Reputation-based secure data aggregation in wireless sensor networks. In Xu, Z, Pan, Y, Shen, H, Hine, J, Huang, Z, Lefevre, L, et al. (Eds.) Proceedings of the Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008. IEEE Computer Society, United States, pp. 419-424.
Number of full-text downloads 509
Number of citations in Scopus 35
Number of citations in Web of Science® 26

, , & (2008) Secure data aggregation in wireless sensor network: a survey. In Miller M, M & Brankovic L, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008). Australian Computer Society, Australia, pp. 93-105.
Number of full-text downloads 5,602
Number of citations in Scopus 63
Number of citations in Web of Science® 26

, Park, Dong-Gook, , , & (2009) A forward & backward secure key management in wireless sensor networks for PCS/SCADA. In Hailes, S, Sicari, S, & Roussos, G (Eds.) Sensor Systems and Software : First International ICST Conference Revised Selected Papers (S-CUBE 2009) [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, Volume 24]. Springer, Germany, pp. 66-82.
Number of full-text downloads 779
Number of citations in Scopus 15

, , & (2010) Information security culture: a behaviour compliance conceptual framework. In Boyd, C & Susilo, W (Eds.) Information Security 2010: AISC '10 Proceedings of the Eighth Australasian Conference on Information Security [Conferences in Research and Practice in Information Technology, Volume 105]. Australian Computer Society, Australia, pp. 51-60.
Number of full-text downloads 2,474
Number of citations in Scopus 53

& (2008) Access Control Requirements for Processing Electronic Health Records. In Paik, H Y, Benatallah, B, & ter Hofstede, A (Eds.) Business Process Management Workshops: BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws - Revised Selected Papers [Lecture Notes in Computer Science, Volume 4928]. Springer, Germany, pp. 371-382.
Number of full-text downloads 1,270
Number of citations in Scopus 48

& (2008) Privacy-preserving electronic health record linkage using pseudonym identifiers. In Wai, Aung Aung Phyo & Maniyeri, Jayachandran (Eds.) Proceedings of HealthComm 2008 10th IEEE International Conference on e-Health Networking, Applications and Services. Institute of Electrical and Electronics Engineers Inc., Singapore, pp. 108-117.
Number of full-text downloads 786
Number of citations in Scopus 37
Number of citations in Web of Science® 21

& (2009) A time-variant medical data trustworthiness assessment model. In Hoang, D & Fourer, M (Eds.) 11th International Conference on e-Health Networking, Applications & Services. Institute of Electrical and Electronics Engineers Inc., Australia, pp. 130-137.
Number of full-text downloads 317
Number of citations in Scopus 7
Number of citations in Web of Science® 3

, , Dacier, Marc, Leita, Corrado, , Pham, Van Hau, Thonnard, Olivier, & (2007) Extracting Inter-Arrival Time Based Behaviour From Honeypot Traffic Using Cliques. In Valli, C & Woodward, A (Eds.) Proceedings of the 5th Australian Digital Forensics Conference. Edith Cowan University, CD Rom, pp. 79-87.
Number of full-text downloads 455
Number of citations in Scopus 8

, , , & (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In Li, M, Cao, J, Liu, H, Weng, C, Wang, X, Tang, H, et al. (Eds.) Proceedings of the IFIP International Conference on Network and Parallel Computing. IEEE Computer Society, United States, pp. 147-154.
Number of full-text downloads 651
Number of citations in Scopus 18
Number of citations in Web of Science® 14

, , , & (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Popescu, M, Georgescu, S, & Heikkinen, S (Eds.) Proceedings of The Fourth International Conference on Internet Monitoring and Protection. IEEE Computer Society, United States, pp. 7-13.
Number of full-text downloads 843
Number of citations in Scopus 21

, , & (2010) Assessing the impact of refactoring on security-critical object-oriented designs. In Thu, T D & Han, J (Eds.) Proceedings of 17th Asia Pacific Software Engineering Conference. IEEE Computer Society, United States, pp. 186-195.
Number of full-text downloads 289
Number of citations in Scopus 18
Number of citations in Web of Science® 9

, , & (2009) Security metrics for object-oriented class designs. In Choi, B (Ed.) Proceedings of the 2009 Ninth International Conference on Quality Software. IEEE Computer Society, United States, pp. 11-20.
Number of full-text downloads 1,010
Number of citations in Scopus 47
Number of citations in Web of Science® 24

, , & (2010) Security metrics for object-oriented designs. In Noble, J & Fidge, C (Eds.) Proceedings of the 21st Australian Software Engineering Conference. Institute of Electrical and Electronics Engineers Inc., United States, pp. 55-64.
Number of full-text downloads 442
Number of citations in Scopus 31

, , , & (2011) User-representative feature selection for the keystroke dynamics. In Hu, H, Foresti, S, Livraga, G, & Samarati, P (Eds.) Proceedings of 2011 5th International Conference on Network and System Security. Institute of Electrical and Electronics Engineers Inc., United States, pp. 229-233.
Number of full-text downloads 340

, , , & (2010) Continuous biometric authentication: Can it be more practical? In Chen, J, Xiang, Y, & Xhafa, F (Eds.) Proceedings 2010 12th IEEE International Conference on High Performance Computing and Communications. IEEE Computer Society, United States, pp. 647-652.
Number of full-text downloads 598
Number of citations in Scopus 23

, Park, Dong-Gook, , & (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Xhafa, F, Denko, M, & Rahayu, W (Eds.) Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Institute of Electrical and Electronics Engineers Inc., United States, pp. 859-865.
Number of full-text downloads 331
Number of citations in Scopus 5
Number of citations in Web of Science® 3

, , & (2010) Display security for online transactions: SMS-based authentication scheme. In Fischer, D (Ed.) Proceedings of the 5th International Conference for Internet Technology and Secured Transactions. Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 1-7.
Number of citations in Scopus 12

, , , & (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Miller M, M & Brankovic L, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008). Australian Computer Society, Australia, pp. 65-73.
Number of citations in Scopus 24

& (2010) The Mobile Phone as a Multi OTP Device using Trusted Computing. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceedings of the 2010 Fourth International Conference on Network and Systems Security. IEEE Computer Society, United States, pp. 75-82.
Number of full-text downloads 563
Number of citations in Scopus 16

, , , & (2008) Strengthening SMS-based authentication through usability. In Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications. IEEE Computer Society, United States, pp. 683-688.
Number of citations in Scopus 8
Number of citations in Web of Science® 4

, , & (2005) Detecting Network-Based Obfuscated Code Injection Attacks Using Sandboxing. In Kerr, K, Clark, A, & Mohay, G (Eds.) AusCERT Asia Pacific Information Technology Security Conference - AusCERT 2005. AusCert Asia Pacific, Australia, pp. 13-25.
Number of full-text downloads 476

, , , , & (2005) Framework for Detecting Network-Based Code Injection Attacks Targeting Windows and UNIX. In Cantarella, J D (Ed.) Twenty-First Annual Computer Security Applications Conference - ACSAC 2005. IEEE Computer Society, United States of America, pp. 41-50.
Number of full-text downloads 357
Number of citations in Scopus 11
Number of citations in Web of Science® 2

& (2008) Consumer-centric and privacy-preserving identity management for distributed e-health systems. In Sprague Jr, R H (Ed.) Proceedings of the 41st Annual Hawaii International Conference on System Sciences. IEEE Computer Society, United States of America, pp. 1-10.
Number of citations in Scopus 15

, , & (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Hsu, J & Cheung, W (Eds.) Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service: EEE-05. IEEE Computer Society, United States of America, pp. 106-111.
Number of citations in Scopus 1

& (2006) Speaker Verification Using Hidden Markov Models in a Multilingual Text-Constrained Framework. In Berkling, K & Torres Carrasquillo, P (Eds.) 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop. Research Publishing Services, India, pp. 1-6.

& (2006) Application Specific Bounds on Detection Cost Using Game Theory. In Berkling, K & Torres Carrasquillo, P (Eds.) 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop. Research Publishing Services, India, pp. 1-5.

& (2006) On the Performance and Use of Speaker Recognition Systems for Surveillance. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 568
Number of citations in Scopus 8

& (2007) The Co-Evolution of Safety Cultures and Crisis Management Capacities in Maritime Trading Systems. In Bell, M, Evans, A, & Bichou, K (Eds.) Risk Management in Port Operations, Logistics and Supply Chain Security. Informa Law, United Kingdom, pp. 205-219.

, , , & (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In Spafford, G (Ed.) Proceedings of the 2011 Sixth International Conference on Availability, Reliability, and Security. IEEE Computer Society, United States, pp. 210-217.
Number of full-text downloads 508
Number of citations in Scopus 43

& (2010) Predicate-based key exchange. In Hawkes, P & Steinfeld, R (Eds.) Information Security and Privacy: 15th Australasian Conference, ACISP 2010 Proceedings [Lecture Notes in Computer Science, Volume 6168]. Springer, Germany, pp. 282-299.
Number of full-text downloads 426
Number of citations in Scopus 19
Number of citations in Web of Science® 10

Boril, Hynek, Omid Sadjadi, Seyed, , & Hansen, John (2010) Analysis and detection of cognitive load and frustration in drivers' speech. In Hirose, K, Nakamura, S, & Kobayashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association. International Speech Communication Association, CD Rom, pp. 502-505.
Number of full-text downloads 748
Number of citations in Scopus 64
Number of citations in Web of Science® 37

(2008) Applications of elliptic curve pairings in cryptography. In Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.) Proceedings of the 73th Workshop on General Algebra. Verlag Johannes Heyn, Austria, pp. 5-16.
Number of full-text downloads 273

, , , & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 13th Australasian Conference, ACISP 2008 Proceedings [Lecture Notes in Computer Science, Volume 5107]. Springer, Germany, pp. 69-83.
Number of full-text downloads 271
Number of citations in Scopus 94
Number of citations in Web of Science® 58

, , & (2005) Security Modelling for Risk Assessment. In Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Counter-Terrorism Technology and Infrastructure Protection. Australian Homeland Security Research Centre, Australia, pp. 35-52.

, , & (2006) Security Risk Analysis for Complex Systems. In Eloff, J H P, Eloff, M M, Venter, H S, & Labuschagne, L (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference. ISSA, South Africa, Pretoria, pp. 1-12.

& (2005) Developing Threat Networks for Risk Analysis of Information Systems. In Eloff, J, Ventor, H S, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference. ISSA, South Africa, Pretoria, pp. 1-9.

, , & (2007) Efficient and Secure Self-Escrowed Public-Key Infrastructures. In Deng, R & Samarati, P (Eds.) Proceedings of the ACM Symposium on Information, Computer, and Communications Security. The Association for Computing Machinery, Singapore, pp. 284-294.
Number of citations in Scopus 4

(2008) Profiting from personal information: Power, information privacy and evidence based policy. In Michael, K & Michael, M G (Eds.) Australia and the New Technologies: Evidence Based Policy in Public Administration. University of Wollongong, Australia, pp. 136-144.
Number of full-text downloads 386

(2007) Re-using Public Sector Information (PSI) for Profit: Who's Data is it Anyway? In Michael, K & Michael, G M (Eds.) The Second Workshop on the Social Implications of National Security. University of Wollongong, Australia, pp. 129-145.

, , & von Nessen, Paul (2009) Legal issues relating to the notification of Australian data breaches. In Kierkegaard, S (Ed.) Proceedings: 4th International Conference LSPI-Legal Discourse in Cyberlaw and Trade. International Association of IT Lawyers (IAITL), Italy, pp. 65-83.

, , & (2010) If it's encrypted its secure! the viability of US state-based encryption exemptions. In Michael, K (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies. Institute of Electrical and Electronics Engineers Inc., United States, pp. 96-102.
Number of full-text downloads 260
Number of citations in Scopus 2
Number of citations in Web of Science® 1

, von Nessen, Paul, , & (2010) Australian data breach notification: avoiding the state/federal overlap. In Kierkegaard, S & Kierkegaard, P (Eds.) Proceeding: 5th International Conference LSPI-Private Law : Rights, Duties and Conflicts. International Association of IT Lawyer (IAITL), Denmark, pp. 40-55.
Number of full-text downloads 261

, Kwok, Lam For, & Longley, Dennis (2010) A business continuity management simulator. In Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330]. Springer, Germany, pp. 9-18.
Number of citations in Scopus 7
Number of citations in Web of Science® 1

& (2005) An information security / assurance vision: development of a multi-disciplinary institute at a public university. In Dodge, R (Ed.) Ninth Colloquium for Information Systems Security Education. The Printing House, United States of America, pp. 1-5.

& (2006) The Impact of Information Security Technologies Upon Society. In Hall, C & Hopkinson, C (Eds.) Social Change in the 21st Century 2006 Conference Proceedings. Queensland University of Technology, Australia, pp. 1-12.
Number of full-text downloads 3,054

& (2006) Information Security and Civil Society Organisations. In Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference. Australian Homeland Security Research Centre, Australia, Australian Capital Territory, Canberra, pp. 314-327.
Number of full-text downloads 380

, , & (2007) Improving Information Security Management in Nonprofit Organisations with Action Research. In Valli, C & Woodward, A (Eds.) Proceedings of The 5th Australian Information Security Management Conference. Edith Cowan University, Australia, pp. 38-46.
Number of full-text downloads 743
Number of citations in Scopus 6

, , Hansen, David, & Maeder, Anthony (2006) The Use of Agent Technologies for Preserving Privacy with Health Records when Linking Federated Databases. In Callen, J, Margelis, G, & Westbrook, J (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer. HISA and HINZ, CD ROM, pp. 1-6.

& (2006) Simultaneous Biometric Verification and Random Number Generation. In Wysocki, B J & Wysocki, T A (Eds.) 5th Workshop on Internet, Telecommunications and Signal Processing. DSP for Communication Systems, CD Rom, pp. 1-6.
Number of full-text downloads 256

& (2007) Biometric Based Cryptographic Key Generation From Faces. In Maeder, A, Bottema, M, Redding, N, & van den Hengel, A (Eds.) Digital Image Computing Techniques and Applications. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 394-401.
Number of full-text downloads 1,309
Number of citations in Scopus 80

, , , , & (2008) Improved GrabCut segmentation via GMM optimisation. In Ceballos, S (Ed.) Proceedings of the Digital Image Computing: Techniques and Applications DICTA 2008 Conference. Institute of Electrical and Electronics Engineers Inc., United States, pp. 39-45.
Number of full-text downloads 388
Number of citations in Scopus 22

, , , & (2008) Multi-view human pose estimation using modified five-point skeleton model. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the International Conference on Signal Processing and Communication Systems, ICSPCS'2007. DSP for Communication Systems, Australia, pp. 109-114.
Number of full-text downloads 339

, , & (2010) Accurate silhouette segmentation using motion detection and graph cuts. In Bakar, SARA, Hamila, R, Boashash, B, & Salleh, S H S S (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 81-84.
Number of full-text downloads 278
Number of citations in Scopus 1

, , , & (2010) Accurate silhouettes for surveillance - improved motion segmentation using graph cuts. In Shen, C, Zhang, J, & Geers, G (Eds.) Proceedings of 2010 Digital Image Computing: Techniques and Applications. Institute of Electrical and Electronics Engineers Inc., United States, pp. 369-374.
Number of full-text downloads 315
Number of citations in Scopus 5

& (2010) Labelled Silhouettes for human pose estimation. In SARA, Bakar, Hamila, R, Salleh, S H S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 574-577.
Number of full-text downloads 164
Number of citations in Scopus 7

, , , , & (2004) A Complete divide and conquer attack on the alphal stream cipher. In Lim, Jong In & Lee, Dong Hoon (Eds.) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, pp. 418-431.
Number of citations in Scopus 2

, , , & (2010) Exploring visual features through gabor representations for facial expression detection. In Ishi, C, Tanaka, A, Tamura, S, Sekiyama, K, & Sakamoto, S (Eds.) Proceedings of The 9th International Conference on Auditory-Visual Speech Processing (AVSP2010). AVSP2010, CD Rom, pp. 89-94.
Number of full-text downloads 166

, , , & (2005) Complementing Computational Protocol Analysis with Formal Specifications. In Dimitrakos, T & Martinelli, F (Eds.) Formal Aspects in Security and Trust - FAST 2004 : IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress [IFIP International Federation for Information Processing, Volume 173]. Springer, United States of America, pp. 129-144.
Number of full-text downloads 350
Number of citations in Scopus 6

, , Acharya, Rajendra, & Lim, C.M. (2008) Automatic Identification of Epilepsy by HOS and Power Spectrum Parameters Using EEG Signals: A Comparative Study. In Dumont, G & Galiana, H (Eds.) Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society - Personalised Healthcare Through Technology. Institute of Electrical and Electronic Engineers (IEEE), CD Rom, pp. 3824-3827.
Number of full-text downloads 97
Number of citations in Scopus 53
Number of citations in Web of Science® 37

, , Acharya, Rajendra, & Lim, C.M. (2007) Higher Order Spectra (HOS) Analysis of Epileptic EEG Signals. In Akay, A, Delhomme, G, & Rousseau, J (Eds.) Proceedings of the 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Institute of Electrical and Electronics Engineers, CD Rom, pp. 6495-6498.
Number of full-text downloads 1,867
Number of citations in Scopus 40
Number of citations in Web of Science® 29

, , & (2009) How to extract and expand randomness: a summary and explanation of existing results. In Fouque, P A, Abdalla, M, Vergnaud, D, & Pointcheval, D (Eds.) Applied Cryptography and Network Security: 7th International Conference, ACNS 2009 Proceedings [Lecture Notes in Computer Science, Volume 5536]. Springer, Germany, pp. 53-70.
Number of full-text downloads 390
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Cohen, Michael, Garfinkel, Simson, & (2009) Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. In Carrier, B (Ed.) Digital Investigation, Volume 6, Supplement 1 : proceedings of the 9th Annual DFRWS Conference. Elsevier Advanced Technology, United Kingdom, pp. 57-68.
Number of citations in Scopus 33
Number of citations in Web of Science® 33

Cohen, Michael & (2010) Hash based disk imaging using AFF4. In Casey, E (Ed.) DFRWS 2010 - The Proceedings of the Tenth Annual DFRWS Conference. Elsevier, United States, S121-S128.
Number of citations in Scopus 9
Number of citations in Web of Science® 12

, , & (2006) 3D Face Recognition Using Log-Gabor Templates. In Fisher, B, Trucco, E, & Chantler, M (Eds.) British Machine Vision Conference 2006 Proceedings (Vol 2). British Machine Vision Association, United Kingdom, pp. 769-778.
Number of full-text downloads 653

, , , & (2006) Combined 2D/3D Face Recognition Using Log-Gabor Templates. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 769
Number of citations in Scopus 42

& (2010) Integrating information security policy management with corporate risk management for strategic alignment. In Chu, H, Lesso, W, Baralt, J, Callaos, N, & Jastrocj, N (Eds.) The 14th World Multi-Conference on Systemics, Cybernetics, and Informatics, Proceedings Volume III. International Institute of Informatics and Systemics, United States, pp. 337-342.
Number of full-text downloads 777
Number of citations in Scopus 14
Number of citations in Web of Science® 3

, , , & (2010) Avoiding full extension field arithmetic in pairing computations. In Lange, T & Bernstein, D J (Eds.) Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Proceedings [Lecture Notes in Computer Science, Volume 6055]. Springer, Germany, pp. 203-224.
Number of full-text downloads 261
Number of citations in Scopus 4
Number of citations in Web of Science® 3

, , , & (2010) Delaying mismatched field multiplications in pairing computations. In Hasan, M A & Helleseth, T (Eds.) Arithmetic of Finite Fields: Third International Workshop, WAIFI 2010 Proceedings [Lecture Notes in Computer Science, Volume 6087]. Springer, Germany, pp. 196-214.
Number of full-text downloads 250

, , , , & (2009) Faster pairings on special Weierstrass curves. In Waters, B & Shacham, H (Eds.) Pairing-Based Cryptography: Third International Conference, Pairing 2009, Proceedings [Lecture Notes in Computer Science, Vol 5671]. Springer, Germany, pp. 89-101.
Number of full-text downloads 310
Number of citations in Scopus 23
Number of citations in Web of Science® 16

& (2010) Fixed argument pairings. In Abdalla, M & Barreto, P (Eds.) Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America Proceedings [Lecture Notes in Computer Science, Volume 6212]. Springer, Germany, pp. 92-108.
Number of full-text downloads 229
Number of citations in Scopus 14
Number of citations in Web of Science® 14

, , Lucey, Simon, & Cohn, Jeff (2008) Least squares congealing for unsupervised alignment of images. In Huang, T (Ed.) Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2008. IEEE Computer Society, United States, pp. 1-8.
Number of full-text downloads 395
Number of citations in Scopus 72
Number of citations in Web of Science® 7

& (2006) Privacy Compliance - Managing the Risks when Integrating Health Data. In Callen, J, Margelis, G, & Westbrook, J (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer. HISA and HINZ, CD ROM, pp. 1-6.

, , , & (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, K, Leong, T Y, & Warren, J (Eds.) Proceedings of the 12th World Congress on Health (Medical) Informatics. IOS Press, Netherlands, pp. 498-502.
Number of full-text downloads 175

& (2006) Perceived Risk: Human Factors Affecting ICT of Critical Infrastructure. In Michael, K & Michael, M G (Eds.) The Social Implications of Information Security Measures on Citizens and Business. University of Wollongong, Centre for eBusiness Application Research (CeBAR), Australia, pp. 213-222.
Number of full-text downloads 287

, Henricksen, Matthew, & (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Billet, O & Robshaw, M (Eds.) New Stream Cipher Designs: The eSTREAM Finalists [Volume 4986: Lecture Notes in Computer Science]. Springer, Germany, pp. 20-38.

, , , & (2006) SKMA - A Key Management Architecture for SCADA Systems. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 183-192.
Number of full-text downloads 622
Number of citations in Scopus 34

De Vel, Olivier, , , & (2001) Multi-Topic E-mail Authorship Attribution Forensics. In Proceedings ACM Conference on Computer Security - Workshop on Data Mining for Security Applications. -.
Number of full-text downloads 650

De Vel, Olivier, , , & (2002) Language and Gender Author Cohort Analysis of e-mail for Computer Forensics. In Proceedings of Digital Forensics Research Workshop. pp. 1-16.
Number of full-text downloads 891
Number of citations in Scopus 33

, , , & Wark, Tim (2007) Fused HMM-Adaptation of Multi-Stream HMMs for Audio-Visual Speech Recognition. In van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). Causal Productions Pty Ltd, Australia, pp. 666-669.
Number of full-text downloads 625
Number of citations in Scopus 5

, , , & (2007) Weighting and Normalisation of Synchronous HMMs for Audio-Visual Speech Recognition. In Swerts, M, Vroomem, J, & Krahmer, E (Eds.) Proceedings of the Workshop on Audio-Visual Speech Processing Cognitive and Computational Approaches. Tilburg University, United States of America, pp. 110-115.
Number of full-text downloads 189

& (2008) Fused HMM Adaptation of Synchronous HMMs for Audio-Visual Speaker Verification. In Vroomen, Jean (Ed.) Proceedings of The International Conference on Auditory-Visual Speech Processing 2008. AVISA, CD Rom, pp. 137-141.

, , & (2008) Cascading appearance-based features for visual speaker verification. In Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 2008). International Speech Communication Association, CD Rom, pp. 359-362.
Number of citations in Scopus 2

, , , & (2010) The QUT-NOISE-TIMIT corpus for evaluation of voice activity detection algorithms. In Hirose, K, Nakamura, S, & Kaboyashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association. International Speech Communication Association, CD Rom, pp. 3110-3113.
Number of full-text downloads 2,077
Number of citations in Scopus 139
Number of citations in Web of Science® 68

, , & (2006) An Examination of Audio-Visual Fused HMMs for Speaker Recognition. In Senac, C & Ferrane, I (Eds.) Proceedings of the Second International Workshop on MultiModal User Authentication. University of California, United States of America, pp. 1-5.
Number of full-text downloads 9

, , , & (2006) A Multi-Class Tracker Using a Scalable Condensation Filter. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 244
Number of citations in Scopus 2

, , , & (2009) Soft-biometrics: unconstrained authentication in a surveillance environment. In Shi, H, Zhang, Y, Lovell, B, Maeder, A, & Bottema, M (Eds.) Proceedings 2009 Digital Image Computing: Techniques and Applications DICTA 2009. Institute of Electrical and Electronics Engineers Inc., United States, pp. 196-203.
Number of full-text downloads 545
Number of citations in Scopus 54
Number of citations in Web of Science® 30

, , , , , , , , & (2006) Multi-View Intelligent Vehicle Surveillance System. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 1,544
Number of citations in Scopus 10

, , & (2010) Group segmentation during object tracking using optical flow discontinuities. In Ma, K K, Wang, H, & Matsushita, Y (Eds.) Proceedings of the 4th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 270-275.
Number of full-text downloads 249
Number of citations in Scopus 7

, , & (2009) Improved simultaneous computation of motion detection and optical flow for object tracking. In Shi, H (Ed.) Proceedings 2009 Digital Image Computing: Techniques and Applications DICTA 2009. Institute of Electrical and Electronics Engineers Inc., United States, pp. 175-182.
Number of full-text downloads 625
Number of citations in Scopus 63
Number of citations in Web of Science® 37

, , , & (2009) Dynamic performance measures for object tracking systems. In Regazzoni, C (Ed.) Proceedings Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance. Institute of Electrical and Electronics Engineers Inc., United States, pp. 541-546.
Number of full-text downloads 204
Number of citations in Scopus 7
Number of citations in Web of Science® 5

, , , & (2010) Multi-modal object tracking using dynamic performance metrics. In Porikli, F (Ed.) Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010. IEEE Computer Society, United States, pp. 286-293.
Number of full-text downloads 222
Number of citations in Scopus 4

Diederich, Joachim, , & (2010) Quo vadis? Reliable and practical rule extraction from neural networks. In Ras, Z W, Kacprzyk, J, Koronacki, J, & Wierzchon, S T (Eds.) Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski. Springer, Germany, pp. 479-490.
Number of citations in Scopus 7
Number of citations in Web of Science® 3

, , , , & (2005) Animation of complex data communications concepts may not always yield improved learning outcomes. In Young, A & Tolhurst, D (Eds.) Proceedings of the 7th Australasian Conference on Computing Education. Australian Computer Society, Australia, pp. 151-154.
Number of full-text downloads 847
Number of citations in Scopus 4

Dowling, Jason, Planitz, Birgit, Maeder, Anthony, , , , Chen, Shaokang, , & Crozier, Stuart (2008) A comparison of DCT and DWT block based watermarking on medical image quality. In Shi, Y Q, Kim, H J, & Katzenbeisser, S (Eds.) Digital Watermarking: 6th International Workshop, IWDW 2007 Proceedings [Lecture Notes in Computer Science, Volume 5041]. Springer, Germany, pp. 454-466.
Number of citations in Scopus 10

, , & (2007) Visual Quality Assessment of Watermarked Medical Images. In Yulei, J & Berkman, S (Eds.) Proceedings of SPIE (Vol. 6515): Progress in Biomedical Optics and Imaging. SPIE - International Society for Optical Engineering, United States of America, pp. 1-12.
Number of full-text downloads 527
Number of citations in Scopus 5
Number of citations in Web of Science® 1

, , & (2005) Recovery of Watermark Using Differential Affine Motion Estimation. In Buyya, R, Montage, P, & Coddington, P (Eds.) ASCW Frontiers 2005. Australian Computer Society, Australia, South Australia, Bedford Park, pp. 81-88.
Number of full-text downloads 326
Number of citations in Scopus 5

, , , & (2006) Formal Analysis of Secure Contracting Protocol for E-Tendering. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 155-164.
Number of full-text downloads 333
Number of citations in Scopus 6

, , & (2006) Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 135-144.
Number of full-text downloads 181
Number of citations in Scopus 1

& (2009) Integrating hardware and software information flow analyses. In Kirsch, C & Kandemir, M (Eds.) Proceedings of the 2009 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems. Association for Computing Machinery, United States, pp. 157-166.
Number of full-text downloads 316
Number of citations in Scopus 1

& (2005) Digital Rights Management (DRM): Managing Digital Rights for Open Access. In Hearn, G, Ninan, A, & Rooney, D (Eds.) Handbook on the Knowledge Economy. Edward Elgar Publishing, United Kingdom, pp. 268-278.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

, , & (2006) Alternative systems for Intellectual Property in the digital age. In Servaes, Jan & Thomas, Pradip (Eds.) Intellectual Property Rights Communication in Asia: Conflicting Traditions. Sage Publications, New Delhi, India, pp. 226-240.
Number of full-text downloads 803

, , , & Tistarelli, Massimo (2010) Frequency decomposition techniques for increased discriminative 3D facial information capture. In Fisher, B & Theobalt (Eds.) Proceedings of 3DPVT'10, the 5th International Symposium on 3D Data Processing, Visualization and Transmission. TUM Fakultat fur Informatik, Technische Universitat Munchen, Germany, pp. 1-8.
Number of full-text downloads 99

, , , , , & Piccardi, Massimo (2010) Semi-supervised intelligent surveillance system for secure environments. In Cecati, C & Blaabjerg, F (Eds.) Proceedings of the 2010 IEEE International Symposium on Industrial Electronics. Institute of Electrical and Electronics Engineers Inc., United States, pp. 2815-2820.
Number of full-text downloads 716
Number of citations in Scopus 27
Number of citations in Web of Science® 18

, Maeder, Anthony, , & (2010) Gaze based personal identification. In Wang, L & Geng, X (Eds.) Behavioural Biometrics for Human Identification: Intelligent Applications. IGI Global, United States, pp. 237-263.
Number of citations in Scopus 11

, , , & (2008) Normalisation and recognition of 3D face data using robust hausdorff metric. In Ceballos, S (Ed.) Proceedings of the Digital Image Computing: Techniques and Applications Conference DICTA 2008. Institute of Electrical and Electronics Engineers Inc., United States, pp. 124-129.
Number of citations in Scopus 2

& (2008) Investigation and comparison of robust stereo image matching using mutual information and hierarchical prior probabilities. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems ICSPCS'2008. Institute of Electrical and Electronics Engineers Inc., Australia, pp. 1-10.
Number of citations in Scopus 2

& (2008) Multi-modal deformable medical image registration. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Telecommunication Systems, 2008. DSP for Communication Systems / IEEE, CD Rom, pp. 1-9.

& (2010) eigenGaze - covert behavioral biometric exploiting visual attention characteristics. In Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 654-657.
Number of full-text downloads 313
Number of citations in Scopus 3

, , & (2008) Security Enhanced Linux to enforce Mandatory Access Control in Health Information Systems. In Yu P, P, Warren, J R, Patrick, J D, & Yearwood, J (Eds.) Health Data and Knowledge Management 2008. Australian Computer Society, Australia, pp. 27-33.

& (2007) Designing Secure e-Contracting Systems. In Swatman, P (Ed.) Proceedings: CollECTeR 2007 - 10th Anniversary. University of South Australia, Australia, pp. 1-12.
Number of full-text downloads 622

, , & (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006. University of Queensland, CD Rom, pp. 73-88.

, , , & (2010) Noise robust voice activity detection using features extracted from the time-domain autocorrelation function. In Hirose, K, Nakamura, S, & Kaboyashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association. International Speech Communication Association, CD Rom, pp. 3118-3121.
Number of full-text downloads 862
Number of citations in Scopus 38
Number of citations in Web of Science® 19

, , , & (2010) Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In Douglas, S (Ed.) Proceedings of the 2010 IEEE International Conference on Acoustics, Speech and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 4470-4473.
Number of full-text downloads 323
Number of citations in Scopus 6
Number of citations in Web of Science® 8

, , & (2010) Interaction, privacy and profiling considerations in local mobile social software: A prototype agile ride share system. In Brereton, M (Ed.) Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction. Association for Computing Machinery, Australia, pp. 376-379.
Number of full-text downloads 334
Number of citations in Scopus 5

, , & (2007) Managing Security Effects of WLAN Deployments in Critical Infrastructure Control Systems. In Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007. Australian Homeland Security Research Centre, Australia, pp. 236-247.

, , & (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 221-230.
Number of full-text downloads 486
Number of citations in Scopus 19

, , & (2006) Specification-Based Intrusion Detection in WLANs. In Payne, C, Schuba, C, & Samarati, P (Eds.) Proceedings of the 22nd Annual Computer Security Applications Conference. IEEE Computer Society, United States of America, pp. 141-150.
Number of full-text downloads 979
Number of citations in Scopus 23
Number of citations in Web of Science® 11

, , , & (2005) Passive Techniques for Detecting Session Hijacking Attacks in IEEE 802.11 Wireless Networks. In Kerr, K, Clark, A, & Mohay, G (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream: Proceedings. University of Queensland, CD Rom, pp. 26-38.
Number of full-text downloads 1,170
Number of citations in Scopus 43

, , & (2010) Intrusion detection system for encrypted networks using secret-sharing schemes. In Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010. Penerbit Universiti, Malaysia, pp. 126-132.
Number of full-text downloads 317
Number of citations in Scopus 4

, , & (2009) Towards intrusion detection for encrypted networks. In Tjoa, S, Weippl, E, & Jakoubi, S (Eds.) Proceedings of the International Conference on Availability, Reliability and Security. IEEE Computer Society, United States of America, pp. 540-545.
Number of full-text downloads 569
Number of citations in Scopus 11
Number of citations in Web of Science® 6

, , & (2009) 50 years of isolation. In Reif, W, Wang, G, Nieto, J G, & Indulska, J (Eds.) Symposia and Workshops on Ubiquitous, Autonomic, and Trusting Computing. IEEE Computer Society, United States, pp. 54-60.
Number of full-text downloads 315
Number of citations in Scopus 3

, , & (2010) Attribute-based authenticated key exchange. In Hawkes, P & Steinfeld, R (Eds.) Information Security and Privacy: 15th Australasian Conference, ACISP 2010 Proceedings [Lecture Notes in Computer Science, Volume 6168]. Springer, Germany, pp. 300-317.
Number of full-text downloads 700
Number of citations in Scopus 43
Number of citations in Web of Science® 31

, , & (2008) ID-based one-pass authenticated key establishment. In Miller M, M & Brankovic L, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008). Australian Computer Society, Australia, pp. 39-46.
Number of full-text downloads 404
Number of citations in Scopus 28

, , & (2009) Modelling key compromise impersonation attacks on group key exchange protocols. In Tsudik, G & Jarecki, S (Eds.) Public Key Cryptography: 12th International Conference on Practice and Theory in Public Key Cryptography, Proceedings [Lecture Notes in Computer Science, Vol 5443]. Springer, Germany, pp. 105-123.
Number of citations in Scopus 48

, , & (2009) Strong designated verifier signature in a multi-user setting. In Susilo, W & Brankovic, L (Eds.) Information Security 2009: proceedings of the 7th Australasian Information Security Conference. Australian Computer Society, Australia, pp. 21-31.
Number of full-text downloads 178
Number of citations in Scopus 3

, , & (2009) Universally composable contributory group key exchange. In Li, W, Susilo, W, Tupakula, U, Safavi-Naini, R, & Varadharajan, V (Eds.) ASIAN ACM Symposium on Information, Computer and Communications Security: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. Association for Computing Machinery, United States, pp. 146-156.
Number of citations in Scopus 13

, , , & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, D & Hong, S (Eds.) Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers [Lecture Notes in Computer Science, Volume 5984]. Springer, Germany, pp. 1-15.
Number of full-text downloads 797
Number of citations in Scopus 23

, , & (2010) A secure framework and related protocols for ubiquitous access to electronic health records using Java SIM cards. In Takeda, H (Ed.) Proceedings of the First IMIA/IFIP Joint Symposium, E-Health 2010 [IFIP Advances in Information and Communication Technology, 2010, Volume 335]. Springer, Germany, pp. 102-113.
Number of full-text downloads 263
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , & (2007) Securing Grid Data Using Mandatory Access Controls. In Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, Australia, pp. 25-32.
Number of full-text downloads 571
Number of citations in Scopus 3

, , & Lincoln, Mike (2008) Microphone array beamforming approach to blind speech separation. In Renals, S, Bourland, H, & Popescu-Belis, A (Eds.) Machine Learning for Multimodal Interaction. Springer, Germany, pp. 295-305.
Number of citations in Scopus 17
Number of citations in Web of Science® 6

, , & (2010) Clustering of ad-hoc microphone arrays for robust blind beamforming. In Douglas, S (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Xplore, United States, pp. 2814-2817.
Number of full-text downloads 269
Number of citations in Scopus 14
Number of citations in Web of Science® 7

, , & (2008) Dealing with uncertainty in microphone placement in a microphone array speech recognition system. In Sayad, A (Ed.) Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1565-1568.
Number of full-text downloads 1,372
Number of citations in Scopus 9
Number of citations in Web of Science® 6

, , & (2008) A multiple-control fuzzy vault. In Korba, L, Marsh, S, & Safavi-Naini, R (Eds.) Proceedings of Sixth Annual Conference on Privacy, Security and Trust, 2008. IEEE Computer Society, United States, pp. 36-47.
Number of citations in Scopus 8
Number of citations in Web of Science® 5

, , & (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In Ceballos, S (Ed.) Proceedings of Digital Image Computing: Techniques and Applications, 2008. IEEE Computer Society, United States, pp. 540-547.
Number of citations in Scopus 5

, , , & (2009) Faster group operations on elliptic curves. In Susilo, W & Brankovic, L (Eds.) Information Security 2009 : proceedings of the 7th Australasian Information Security Conference. Australian Computer Society, Australia, pp. 7-19.
Number of full-text downloads 206
Number of citations in Scopus 32

, , , & (2009) Jacobi quartic curves revisited. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Proceedings [Lecture Notes in Computer Science, Volume 5594]. Springer, Germany, pp. 452-468.
Number of citations in Scopus 30
Number of citations in Web of Science® 18

, , , & (2008) Twisted Edwards curves revisited. In Peiprzyk, J (Ed.) Advances in Cryptology: 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, Proceedings [Lecture Notes in Computer Science, 5350]. Springer, Germany, pp. 326-343.
Number of citations in Scopus 150
Number of citations in Web of Science® 115

, , , , Bracher, Shane, Raub, Tobias, & Flegel, Ulrich (2011) Detecting collusive fraud in enterprise resource planning systems. In Shenoi, S & Petersen, G (Eds.) Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361]. Springer, Germany, pp. 143-154.
Number of full-text downloads 489
Number of citations in Scopus 3

, , , , Bracher, Shane, Raub, Tobias, & Flegel, Ulrich (2010) Fraud detection in ERP systems using scenario matching. In Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330]. Springer, Germany, pp. 112-123.
Number of full-text downloads 674
Number of citations in Scopus 15
Number of citations in Web of Science® 6

Ismail, Roslan, , , & Russel, S (2003) Strong Privacy In Reputation Systems. In Chae, K & Yung, M (Eds.) Information security applications: proceedings of the 4th International Workshop. Springer, United States of America, p. 1.

(2006) Online Reputation Systems for the Health Sector. In Au, R, Croll, P, & Morarji, H (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006. QUT, Australia, Queensland, Brisbane, pp. 78-88.
Number of citations in Web of Science® 5

(2007) Probabilistic Logic under Uncertainty. In Jay, B & Gudmundsson, J (Eds.) Theory of Computing 2007 (Volume 65). Australian Computer Society, http://crpit.com/abstracts/CRPITV65Josang.html, pp. 101-110.
Number of full-text downloads 402
Number of citations in Scopus 25

Josang, Audun & (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Miller, M & Brankovic, L (Eds.) Information Security 2008. Australian Computer Society, Australia, pp. 53-58.
Number of citations in Scopus 3

, , & (2007) Usability and Privacy in Identity Management Architectures. In Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, Australia, pp. 143-152.
Number of full-text downloads 1,349
Number of citations in Scopus 84

, Gollmann, Dieter, & (2006) A Method for Access Authorisation Through Delegation Networks. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006. Australian Computer Society, Australia, New South Wales, Sydney, pp. 165-174.
Number of citations in Scopus 10

, , & Pope, Simon (2006) Trust Network Analysis with Subjective Logic. In Dobbie, G & Estivill-Castro, V (Eds.) Conference Proceedings of the Twenty-Ninth Australasian Computer Science Conference (ACSW 2006). Australian Computer Society, CD Rom, pp. 85-94.
Number of full-text downloads 2,265
Number of citations in Scopus 273

, Pope, Simon, & McAnally, David (2006) Normalising the Consensus Operator for Belief Fusion. In Tijus, C (Ed.) Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems. Editions E.D.K, CD ROM, pp. 1420-1427.

, , , & (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Gen, Mitsuo & Oyabu, Takashi (Eds.) Proceedings of Asia Pacific Industrial Engineering & Management Systems Conference 2009. APIEMS Society, Japan, pp. 2541-2552.
Number of full-text downloads 572

, , & (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Tjoa, S, Weippl, E R, & Jakoubi, S (Eds.) Proceedings of the Third International Conference on Availability, Security and Reliability (ARES 2008). IEEE Computer Society, United States, pp. 47-55.
Number of full-text downloads 866
Number of citations in Scopus 26
Number of citations in Web of Science® 13

, , & (2007) Length Based Modelling of HTTP Traffic for Detecting SQL Injection Attacks. In Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007. Australian Homeland Security Research Centre, Australia, pp. 67-78.

, Boyrazp, Pinar, Boril, Hynek, , & Hansen, John (2009) Assessment of speech dialog systems using multi-modal cognitive load analysis and driving performance metrics. In Sable, A & Prasad, K (Eds.) Proceedings of the IEEE International Conference on Vehicular Electronics and Safety. Institute of Electrical and Electronics Engineers Inc., India, pp. 167-172.
Number of full-text downloads 454
Number of citations in Scopus 3

, , , & (2009) The Australian English speech corpus for in-car speech processing. In Lee, L (Ed.) Proceedings of the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., Online, pp. 4177-4180.
Number of full-text downloads 343
Number of citations in Scopus 1
Number of citations in Web of Science® 1

, , & (2010) The application of phonetic distribution normalisation to likelihood-maximising speech enhancement for robust ASR. In Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology. The Australasian Speech Science and Technology Association Inc, Australia, pp. 118-121.
Number of full-text downloads 62

, , & (2010) The effect of dialect mismatch on likelihood-maximising speech enhancement for noise-robust speech recognition. In Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology. The Australasian Speech Science and Technology Association Inc, Australia, pp. 114-117.
Number of full-text downloads 90

, , & (2008) A modified LIMA framework for spectral subtraction applied to in-car speech recognition. In Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 1st International Conference on Signal Processing and Telecommunication Systems. DSP for Communication Systems, Australia, pp. 335-338.
Number of full-text downloads 148

, , , , & (2011) Gap analysis of intrusion detection in smart grids. In Valli, C (Ed.) Proceedings of 2nd International Cyber Resilience Conference. secau-Security Research Centre, Australia, pp. 38-46.
Number of full-text downloads 761

, , & (2009) Affine adaptation of local image features using the Hessian matrix. In Tubaro, S & Dugelay, J L (Eds.) Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance. Institute of Electrical and Electronics Engineers Inc., United States, pp. 496-501.
Number of full-text downloads 1,083
Number of citations in Scopus 22
Number of citations in Web of Science® 19

, , & (2009) Dense correspondence extraction in difficult uncalibrated scenarios. In Shi, H, Zhang, Y, Lovell, B, Maeder, A, & Bottema, M J (Eds.) Proceedings of 2009 Digital Image Computing: Techniques and Applications. Institute of Electrical and Electronics Engineers Inc., United States, pp. 53-60.
Number of full-text downloads 328
Number of citations in Scopus 7
Number of citations in Web of Science® 3

, , , & (2008) A feature clustering algorithm for scale-space analysis of image structures. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Telecommunication Systems. DSP for Communication Systems, Australia, pp. 186-192.
Number of full-text downloads 360

(2010) A two-step mutual authentication protocol based on randomized hash-lock for small RFID networks. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security. IEEE Computer Society, United States of America, pp. 527-533.
Number of full-text downloads 650
Number of citations in Scopus 6

, , , & (2007) Automatic Tracking, Super-Resolution and Recognition of Human Faces from Surveillance Video. In Sako, H (Ed.) Proceedings of IAPR Conference on Machine Vision Applications. Seiki Tsushinsya, Japan, pp. 37-40.
Number of full-text downloads 157
Number of citations in Scopus 4

, , , & (2006) The Role of Motion Models in Super-Resolving Surveillance Video for Face Recognition. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 322
Number of citations in Scopus 4

, , , & (2005) Investigation into Optical Flow Super-Resolution for Surveillance Applications. In Lovell, B & Maeder, A (Eds.) WDIC 2005: APRS Workshop on Digital Image Computing: Workshop Proceedings. University of QLD, CD Rom, pp. 73-78.
Number of full-text downloads 524

, , & (2010) Efficient certificateless KEM in the standard model. In Lee, D & Hong, S (Eds.) Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers [Lecture Notes in Computer Science, Volume 5984]. Springer, Germany, pp. 34-46.
Number of full-text downloads 314
Number of citations in Scopus 9
Number of citations in Web of Science® 3

, , & (2009) Strongly secure certificateless key agreement. In Waters, B & Shacham, H (Eds.) Pairing-Based Cryptography: Third International Conference, Pairing 2009, Proceedings [Lecture Notes in Computer Science, Vol 5671]. Springer, Germany, pp. 206-230.
Number of full-text downloads 781
Number of citations in Scopus 91
Number of citations in Web of Science® 57

& (2010) Certificateless key agreement in the standard model. In Boyd, C & Susilo, W (Eds.) Information Security 2010. Australian Computer Society, Australia, pp. 75-85.
Number of full-text downloads 388
Number of citations in Scopus 7

, O'Rourke, Damien, , , & (2010) A distributed protocol for object tracking in wireless multimedia sensor networks. In Gubbi, J, Corke, P, Marusic, S, & Palaniswami, M (Eds.) Proceedings of the Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 67-72.
Number of citations in Scopus 1

, O'Rourke, Damien, , , & (2009) Camera calibration in wireless multimedia sensor networks. In Law, Y, Gubbi, J, Marusic, S, & Palaniswami, M (Eds.) Proceedings of the 2009 Fifth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. IEEE Victorian Section, Australia, pp. 301-306.
Number of full-text downloads 207
Number of citations in Scopus 4

, , , & (2008) Open Trusted Health Informatics Structure (OTHIS). In Yu, P, Warren, J R, Patrick, J D, & Yearwood, J (Eds.) Proceedings of the Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008). Australian Computer Society, Australia, pp. 35-63.
Number of full-text downloads 355

, , , & (2009) Privacy and security in open and trusted health information systems. In Warren, J R (Ed.) Proceeding of the Third Australasian Workshop on Health Informatics and Knowledge Management. Australian Computer Society, Australia, pp. 25-30.
Number of full-text downloads 297

, , , , , , , & (2010) A secure architecture for Australia's index based e-health environment. In Maeder, A & Hansen, D (Eds.) Proceedings of 4th Australasian Workshop on Health Informatics and Knowledge Management. Australian Computer Society, Australia, pp. 7-16.
Number of full-text downloads 425

, , & (2006) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. In Au, R, Croll, P, & Morarji, H (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006. QUT, Australia, Queensland, Brisbane, pp. 51-66.
Number of full-text downloads 1,357
Number of citations in Web of Science® 2

, , , , & (2009) Open and trusted information systems/health informatics access control (OTHIS/HIAC). In Susilo, W & Brankovic, L (Eds.) Proceeding of the Seventh Australasian Information Security Conference (AISC 2009). Australian Computer Society, Australia, pp. 99-108.
Number of full-text downloads 216
Number of citations in Scopus 4

, , , & (2007) A Sustainable Approach to Security and Privacy in Health Information Systems. In Toleman, M, Roberts, & Cater-Steel, A (Eds.) Proceedings of the 18th Australasian Conference on Information Systems. The University of Southern Queensland, Australia, pp. 255-265.
Number of full-text downloads 568
Number of citations in Scopus 4

Long, Benjamin, , & Carrington, David (2007) Cross-Layer Verification of Type Flaw Attacks on Security Protocols. In Dobbie, G (Ed.) Computer Science 2007: Proceedings of the 30th Australasian Computer Science Conference (CRPIT, Volume 62). Australian Computer Society, Australia, pp. 171-180.
Number of full-text downloads 286
Number of citations in Scopus 6

Longley, Dennis, , , & Kwok, Lam For (2008) Feasibility of automated information security compliance auditing. In Cimato, S, Jajodia, S, & Samarati, P (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference [IFIP International Federation for Information Processing, Volume 278]. Springer, United States, pp. 493-508.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

, , , , , & (2010) Protecting the protectors : legal liabilities from the use of Web 2.0 for Australian disaster response. In Michael, K (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies. Institute of Electrical and Electronics Engineers Inc., United States, pp. 411-418.
Number of full-text downloads 450
Number of citations in Scopus 10
Number of citations in Web of Science® 6

, , Cohn, Jeff, Lucey, Simon, , & Ambadar, Zara (2008) Improving pain recognition through better utilisation of temporal information. In Gocke, R, Lucey, P, & Lucey, S (Eds.) Proceedings of the International Conference on Auditory-Visual Speech Processing 2008. AVISA, CD Rom, pp. 167-172.
Number of citations in Scopus 24

, , , , & Cohn, Jeff (2008) Comparing object alignment algorithms with appearance variation: forward-additive vs inverse-composition. In Wu, Q, Li, W, Siu, W C, Feng, D, Guan, L, Sikora, T, et al. (Eds.) Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 337-342.
Number of citations in Scopus 2

& Potamianos, Gerasimos (2006) Audio-Visual ASR from Multiple Views Inside Smart Rooms. In Hanebeck, U & Henderson, T C (Eds.) 2006 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 35-40.
Number of full-text downloads 289
Number of citations in Scopus 6

& Potamianos, Gerasimos (2006) Lip-reading Using Profile Versus Frontal Views. In Zheng, H & Tzanetkis, G (Eds.) 2006 International Workshop on Multimedia Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 24-28.
Number of full-text downloads 905
Number of citations in Scopus 52
Number of citations in Web of Science® 29

, Potamianos, Gerasimos, & (2008) Patch-based analysis of visual speech from multiple views. In Gocke, R, Lucey, P, & Lucey, S (Eds.) Proceedings of the International Conference on Auditory-Visual Speech Processing 2008. AVISA, CD Rom, pp. 69-74.
Number of full-text downloads 306

, Potamianos, Gerasimos, & (2008) Visual speech recognition across multiple views. In Liew, A & Wang, S (Eds.) Visual Speech Recognition. Lip Segmentation and Mapping. Information Science Reference, United States, pp. 294-325.

, Potamianos, Gerasimos, & (2007) An Extended Pose-Invariant Lipreading System. In Swerts, M, Vroomem, J, & Krahmer, E (Eds.) Proceedings of the Workshop on Audio-Visual Speech Processing: Cognitive and Computational Approaches. Tilburg University, Netherlands, pp. 1-5.
Number of full-text downloads 282

, Potamianos, Gerasimos, & (2007) A Unified Approach to Multi-Pose Audio-Visual ASR. In van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). Causal Productions Pty Ltd, CD Rom, pp. 650-653.
Number of full-text downloads 306
Number of citations in Scopus 6
Number of citations in Web of Science® 2

& (2008) A visual front-end for a continuous pose-invariant lipreading system. In Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-6.
Number of citations in Scopus 6

, , & (2008) Continuous pose-invariant lipreading. In Burnham, D (Ed.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 2008). International Speech Communication Association, CD Rom, pp. 2679-2682.
Number of full-text downloads 347
Number of citations in Scopus 17
Number of citations in Web of Science® 8

& (2007) Patch-Based Representation of Visual Speech. In Goecke, R, Caelli, T, & Robles-Kelly, A (Eds.) Proceedings of the HCSNet Workshop on the Use of Vision in Human-Computer Interaction. Australian Computer Society, Australia, pp. 79-85.
Number of full-text downloads 206

, , & (2006) Human Face Reconstruction Using Bayesian Deformable Models. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 585

, , & (2007) Forensic Challenges in Service Oriented Architectures. In Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007. Australian Homeland Security Research Centre, Australia, Australian Capital Territory, Canberra, pp. 356-366.
Number of full-text downloads 395

, , , & (2007) Event-Based Computer Profiling for the Forensic Reconstruction of Computer Activity. In Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007, IT-Security: Finding the Balance. University of Queensland, Australia, pp. 71-87.
Number of full-text downloads 1,373

, , , & (2006) Computer Profiling to Assist Computer Forensic Investigations. In Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference. Australian Homeland Security Research Centre, Australia, pp. 287-301.

, , , & (2010) A model for computer profiling. In Slay, J, Simon, M, & Osborne, G (Eds.) Proceedings of the 5th International Conference on Availability, Reliability, and Security. Institute of Electrical and Electronics Engineers Inc., United States, pp. 635-640.
Number of full-text downloads 387
Number of citations in Scopus 9
Number of citations in Web of Science® 6

, , & (2006) Towards Improved Assessment of Phonotactic Information for Automatic Language Identification. In Berkling, K & Torres Carrasquillo, P (Eds.) 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop. Research Publishing Services, India, pp. 1-8.
Number of full-text downloads 737

& (2006) E-courts: towards information protection management structures. In Michael, K & Michael, M (Eds.) The Social Implications of Information Security Measures on Citizens and Business. The University of Wollongong, Centre for eBusiness Application Research, Wollongong, Australia, pp. 179-190.

& (2006) Ensuring the Integrity of Australia's e-Court Process. In Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference. Australian Homeland Security Research Centre, Australia, pp. 259-273.

& (2006) Towards protecting critical infrastructure - the role of information security management in Australian universities. In Michael, K & Michael, M (Eds.) The Social Implications of Information Security Measures on Citizens and Business. University of Wollongong, Centre for eBusiness Application Research, Wollongong, Australia, pp. 231-242.

, , & (2006) 2D-3D Face Recognition Based on PCA and Feature Modelling. In Senac, C & Ferrane, I (Eds.) Proceedings of the Second International Workshop on MultiModal User Authentication. University of California, United States of America, pp. 1-8.

, , , & (2006) Feature Modelling of PCA Difference Vectors for 2D and 3D Face Recognition. In He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006. IEEE Computer Society, CD Rom, pp. 1-6.
Number of full-text downloads 645
Number of citations in Scopus 3

, , , & (2008) Normalisation of 3D face data. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Communication Systems, CSPCS'2007. DSP for Communication Systems, Australia, pp. 1-7.

, , , & (2008) Ground-plane based projective reconstruction for surveillance camera networks. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Telecommunication Systems, ICSPCS 2007. DSP for Communication Systems, Australia, pp. 423-428.
Number of full-text downloads 165

& (2007) Minimising Legal Risks in Electronic Contracting. In Swatman, P M C (Ed.) Proceedings: CollECTeR 2007 - 10th Anniversary. University of South Australia, Australia, pp. 1-12.
Number of full-text downloads 1,590

, , , & (2010) Exploiting multiple feature sets in data-driven impostor dataset selection for speaker verification. In Douglas, S (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 4434-4437.
Number of full-text downloads 234
Number of citations in Scopus 3
Number of citations in Web of Science® 2

, , , & (2010) QUT Speaker Identity Verification system for EVALITA 2010. In Bakar, Sy, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 49-52.
Number of full-text downloads 208
Number of citations in Scopus 1

, , , & (2007) A Comparison of Session Variability Compensation Techniques for SVM-Based Speaker Recognition. In van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). Casual Productions Pty Ltd, CD Rom, pp. 790-793.
Number of full-text downloads 511
Number of citations in Scopus 4

(2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics. Allied Publishers Pvt Ltd, India, pp. 277-284.

(2005) Technical Challenges and Directions for Digital Forensics. In Huang, M Y (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005. IEEE Computer Society, United States of America, pp. 155-164.
Number of citations in Scopus 47
Number of citations in Web of Science® 31

, , , Nadarajan, Anitha, Ravindran, B., , & Vijayasarathy, R. (2011) Detection and mitigation of high-rate flooding attacks. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 131-181.
Number of citations in Web of Science® 6

Molland (Visiting Scholar), Hoverd & Helleseth, Tor (2005) A Linear Weakness in the Klimov-Shamir T-function. In Grant, A & Kennedy, R (Eds.) Proceedings of the 2005 IEEE International Symposium on Information Theory (ISIT 05). Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 1106-1110.
Number of citations in Web of Science® 7

Mosca, Michele & (2010) Quantum Coins. In Bruen, Aiden A & Wehlau, David L (Eds.) Proceeding of the Contemporary Mathematics: Error-Correcting Codes, Finite Geometrices and Cryptography. American Mathematical Society, United States, pp. 35-47.
Number of full-text downloads 339
Number of citations in Web of Science® 36

, , , , & (2010) Cascading appearance-based features for visual voice activity detection. In Ishi, C, Tanaka, A, Tamura, S, Sekiyama, K, & Sakamoto, S (Eds.) Proceedings of The 9th International Conference on Auditory-Visual Speech Processing (AVSP2010). Auditory-visual Speech Processing (AVSP), CD Rom, pp. 3-7.
Number of full-text downloads 154

, , , , & (2010) Recognising audio-visual speech in vehicles using the AVICAR database. In Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology. The Australasian Speech Science and Technology Association Inc, Australia, pp. 110-113.
Number of full-text downloads 260

, , , , & (2010) Lip detection for audio-visual speech recognition in-car environment. In Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 598-601.
Number of full-text downloads 404
Number of citations in Scopus 16

, , & (2010) Automating computational proofs for public-key-based key exchange. In Heng, S & Kurosawa, K (Eds.) Provable Security: 4th International Conference, ProvSec 2010, Proceedings [Lecture Notes in Computer Science, Volume 6402]. Springer, Germany, pp. 53-69.
Number of full-text downloads 370
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , & (2010) Fusing shrinking and expanding active contour models for robust iris segmentation. In Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 185-188.
Number of full-text downloads 392
Number of citations in Scopus 19

, , & (2010) Robust mean super-resolution for less cooperative NIR iris recognition at a distance and on the move. In Giang, N T (Ed.) Proceedings of the Symposium on Information and Communication Technology. ACM Digital Library, United States, pp. 122-127.
Number of full-text downloads 331
Number of citations in Scopus 12
Number of citations in Web of Science® 33

, , , & (2010) Focus-score weighted super-resolution for uncooperative iris recognition at a distance and on the move. In Green, R & Bainbridge-Smith, A (Eds.) Proceedings of the 25th International Conference of Image and Vision Computing New Zealand IVCNZ-2010. University of Canterbury, New Zealand, pp. 1-8.
Number of full-text downloads 309
Number of citations in Scopus 15

, , , & (2007) Multi-Step Scenario Matching Based on Unification. In Valli, C & Woodward, A (Eds.) Proceedings of the 5th Australian Digital Forensics Conference. Edith Cowan University, CD Rom, pp. 87-96.
Number of full-text downloads 363

, , , & (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics. Allied Publishers Pvt Ltd, India, pp. 151-162.

Paterson, Kenneth & (2010) One-time-password-authenticated key exchange. In Hawkes, P & Steinfeld, R (Eds.) Information Security and Privacy: 15th Australasian Conference, ACISP 2010 Proceedings [Lecture Notes in Computer Science, Volume 6168]. Springer, Germany, pp. 264-281.
Number of full-text downloads 1,263
Number of citations in Scopus 24
Number of citations in Web of Science® 10

, , & (2006) Sealed-Bid Micro Auctions. In Yngstrom, L, Lindskog, S, Rannenberg, K, & Fischer-Hubner, S (Eds.) Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006) [IFIP International Federation for Information Processing, Volume 201]. Springer, United States of America, pp. 246-257.
Number of full-text downloads 258
Number of citations in Scopus 1

& (2007) A Range Test Secure in the Active Adversary Model. In Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, Australia, pp. 159-162.
Number of full-text downloads 138
Number of citations in Scopus 6

, , , Okamoto, Eiji, & Lopez, Javier (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Mu, Y, Li, Y, Wang, H, & Desmedt, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005. Spreinger-Verlag, Germany, pp. 247-260.
Number of full-text downloads 244
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , & (2005) Challenges of Automating the Detection of Paedophile Activity on the Internet. In Huang, M (Ed.) Systematic Approaches to Digital Forensic Engineering. IEEE Computer Society, United States of America, pp. 206-222.
Number of full-text downloads 2,707
Number of citations in Scopus 9
Number of citations in Web of Science® 10

, , & (2010) A framework for improved adolescent and child safety in MMOs. In Memon, N & Alhaji, R (Eds.) Proceedings 2010 International Conference on Advances in Social Network Analysis and Mining. IEEE Computer Society, United States, pp. 33-40.
Number of full-text downloads 446
Number of citations in Scopus 7
Number of citations in Web of Science® 5

, , , & (2008) Commitment issues in delegation process. In Miller, M & Brankovic, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference. Australian Computer Society, Australia, pp. 27-38.
Number of full-text downloads 176
Number of citations in Scopus 10

, , , & (2009) On a taxonomy of delegation. In Lopez, J & Gritzalis, D (Eds.) Emerging challenges for security, privacy and trust : proceedings of the 24th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2009, Volume 297]. Springer, Germany, pp. 353-363.
Number of full-text downloads 253
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , , & (2010) How HCI design influences web security decisions. In Kraal, B & Viller, S (Eds.) Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction. Association for Computing Machinery, Australia, pp. 252-255.
Number of full-text downloads 264
Number of citations in Scopus 2

, , & (2009) FIA: An open forensic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia : Proceedings of the 2nd International Conference [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009, Volume 8]. Springer, Germany, pp. 83-94.
Number of full-text downloads 1,299
Number of citations in Scopus 14

& (2005) DRM, Trusted Computing and Operating System Architecture. In Buyya, R, Montague, P, Sheppard, S, Coddington, P, Wendelborn, A, & Safavi-Naini, R (Eds.) ACSW Frontiers 2005: Proceedings of the 3rd Australasian Workshop on Grid Computing and e-Research and the 3rd Australasian Information Security Workshop [Conferences in Research and Practice in Information Technology, Volume 44]. Australian Computer Society, Australia, pp. 127-136.
Number of full-text downloads 1,287
Number of citations in Scopus 21

, , , & (2007) Detecting Relay Attacks with Timing-Based Protocols. In Deng, R & Samarati, P (Eds.) Proceedings of the ACM Symposium on Information, Computer, and Communications Security. The Association for Computing Machinery, Singapore, pp. 204-213.
Number of full-text downloads 2,314
Number of citations in Scopus 159

, , & (2005) Security Considerations for Conducted and Radiated Emissions. In Peng, S T (Ed.) Asia Pacific Symposium on EMC Taipei - APEMC 2005. IEEE EMC Society, Taiwan, pp. 345-348.
Number of full-text downloads 685

, , , & (2006) A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography. In Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006. University of Queensland, CD Rom, pp. 57-72.
Number of full-text downloads 1,047

, , & (2007) On Ensuring Continuity of Mobile Communications in a Disaster Environment. In Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007. Australian Homeland Security Research Centre, Australia, pp. 268-277.
Number of full-text downloads 215

, , & (2007) A Secure Billing Architecture for 4G Wireless Networks. In Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007. University of Queensland, Australia, pp. 14-30.
Number of full-text downloads 328

, , & (2007) Securely Deploying IEEE 802.11 WLANs. In Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007. University of Queensland, Australia, pp. 50-70.
Number of full-text downloads 792
Number of citations in Scopus 8

& (2006) A Project for the Synthesis of Composite TCP / IP Networks During Emergencies. In Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006. University of Queensland, CD ROM, pp. 89-103.

, , , & (2010) Crowd counting using group tracking and local features. In Porikli, F (Ed.) Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010. IEEE Computer Society, United States, pp. 218-224.
Number of full-text downloads 1,201
Number of citations in Scopus 23

, , , & (2008) Scene invariant crowd counting for real-time surveillance. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems (ICSPCS'2008). Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-7.
Number of full-text downloads 347
Number of citations in Scopus 7

& (2007) A Data Warehouse Architecture for Clinical Data Warehousing. In Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, Australia, pp. 227-232.
Number of full-text downloads 3,207
Number of citations in Scopus 45

& (2010) Information Accountability Framework for a Trusted Health Care System. In Hansen, D, Schaper, L, & Rowlands, D (Eds.) Proceedings of the 18th Annual Health Informatics Conference: Informing the Business of Healthcare. Health Informatics Society of Australia Ltd, Australia, pp. 79-85.
Number of full-text downloads 114

, , & (2010) An administrative model for UCON ABC. In Boyd, C & Susilo, W (Eds.) Information Security 2010. Australian Computer Society, Australia, pp. 32-38.
Number of full-text downloads 250

, , , & (2010) Towards a game theoretic authorisation model. In Baras, J S, Alpcan, T, & Buttyan, L (Eds.) Decision and Game Theory for Security: First International Conference, GameSec 2010, Proceedings [Lecture Notes in Computer Science, Volume 6442]. Springer, Germany, pp. 208-219.
Number of full-text downloads 638
Number of citations in Scopus 5
Number of citations in Web of Science® 1

, , & Safavi-Naini, Reihaneh (2010) A rights management approach to securing data distribution in coalitions. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security. IEEE Computer Society, United States of America, pp. 560-567.
Number of full-text downloads 161
Number of citations in Scopus 5

& (2006) An Open Architecture for Digital Evidence Integration. In Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006. University of Queensland, CD Rom, pp. 15-29.
Number of full-text downloads 603

& Cohen, Michael (2010) Refining evidence containers for provenance and accurate data representation. In Chow, K P & Shenoi, S (Eds.) Advances in Digital Forensics VI: proceedings of the 6th IFIP WG 11.9 International Conference on Digital Forensics [IFIP Advances in Information and Communication Technology, 2010, Volume 337]. Springer, Germany, pp. 227-242.
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Scheffer, Nicholas & (2010) On the use of speaker superfactors for speaker recognition. In Hansen, J H L (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 4410-4413.
Number of citations in Scopus 2

Scheffer, Nicholas, , Kajarekar, Sachin, & Pelecanos, Jason (2009) Combination strategies for a factor analysis phone-conditioned speaker verification system. In Lee, L (Ed.) Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2009. Institute of Electrical and Electronics Engineers Inc., Online, pp. 4053-4056.
Number of full-text downloads 448
Number of citations in Scopus 5

, , , , , , & (2010) A distributed denial of service testbed. In Hilty, L M, Berleur, J, & Hercheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328]. Springer, Germany, pp. 338-349.
Number of full-text downloads 689
Number of citations in Scopus 14
Number of citations in Web of Science® 10

, , , & (2009) Multi-vehicles interaction graph model for cooperative collision warning system. In Zheng, N (Ed.) Proceedings of IEEE Intelligent Vehicles Symposium 2009. Institute of Electrical and Electronic Engineers (IEEE), Online, pp. 929-934.
Number of full-text downloads 431
Number of citations in Scopus 27
Number of citations in Web of Science® 16

, , , & (2010) A multicast routing scheme for efficient safety message dissemination in VANET. In Guo, Y J & Shafi, M (Eds.) Proceedings of the 2010 IEEE Wireless Communications and Networking Conference. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-6.
Number of full-text downloads 633
Number of citations in Scopus 31

, Henricksen, Matthew, & Yap, Wun-She (2009) Improved cryptanalysis of the common scrambling algorithm stream cipher. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Proceedings [Lecture Notes in Computer Science, Volume 5594]. Springer, Germany, pp. 108-121.
Number of full-text downloads 4,356
Number of citations in Scopus 10
Number of citations in Web of Science® 2

(2007) Denial of Service Vulnerabilities in IEEE 802.11i. In Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007. Australian Homeland Security Research Centre, Australia, pp. 202-213.

, , Chellappan, C., Meenakshi, S., Raghavan, S., , & (2011) DoS vulnerabilities in IPv6. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 299-321.

, , & (2006) On Securing Wireless LAN Access to Government Information Systems. In Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference. Australian Homeland Security Research Centre, Australia, pp. 440-453.
Number of full-text downloads 1,068

, , & (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 125-134.
Number of citations in Scopus 25

, , & McNair, Neil (2008) Information assurance education in a specialist defence environment. In Dodge, Ron (Ed.) Proceedings from the Twelfth Colloquium for Information Systems Security Education. The Printing House, United States, pp. 9-13.

Soar, Jeffrey & (2007) Assistive Technologies for the Frail Elderly, Chronic Illness Sufferers and People with Disabilities - A Case Study of the Development of a Smart Home. In Toleman, M, Roberts, D, & Cater-Steel, A (Eds.) ACIS2007 Proceedings of the 18th Australasian Conference on Information Systems. The University of Southern Queensland, CD ROM, pp. 937-944.
Number of full-text downloads 1,090
Number of citations in Scopus 15

(2010) Reinforcing bad behaviour: The misuse of security indicators on popular websites. In Breteton, M (Ed.) Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction. Association for Computing Machinery, Australia, pp. 248-251.
Number of full-text downloads 620
Number of citations in Scopus 12

, Mosca, Michele, & Lutkenhaus, Norbet (2010) The case for quantum key distribution. In Pascazio, S, Sergienko, A, & Villoresi, P (Eds.) Quantum Communication and Quantum Networking : First International Conference Revised Selected Papers [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, Volume 36]. Springer, Germany, pp. 283-296.
Number of full-text downloads 385
Number of citations in Scopus 27

, Udupi, Poomaprajna, & Chang Shantz, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, C & Susilo, W (Eds.) Information Security 2010. Australian Computer Society, Australia, pp. 56-66.
Number of full-text downloads 333

& Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Proceedings [Lecture Notes in Computer Science, Volume 5594]. Springer, Germany, pp. 389-406.
Number of full-text downloads 534
Number of citations in Scopus 14
Number of citations in Web of Science® 9

& (2006) A Novel Approach for GPR Antenna Height Estimation. In Chen, C C, Sato, M, Yarovoy, A G, & Johnson, J T (Eds.) Proceedings of the 11th International Conference on Ground Penetrating Radar. The Ohio State University, CD Rom, pp. 1-4.

, , & (2010) Delegation in predicate encryption supporting disjunctive queries. In Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330]. Springer, Germany, pp. 229-240.
Number of full-text downloads 382
Number of citations in Scopus 1
Number of citations in Web of Science® 1

, , Robinson, Warwick, & (2010) Using decision trees in economizer repair decision making. In Pecht, M (Ed.) Proceedings of the 2010 IEEE - Prognostics and System Health Management Conference (PHM-2010 Macau). Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-6.
Number of full-text downloads 1,080
Number of citations in Scopus 2

, Ashley, Paul, & (2007) Future Standardization Areas for Identity Management Systems. In Mont, M, Griffin, P, Camenisch, J, Claessens, J, & Fischer-Hubner, S (Eds.) Proceedings of 2nd PRIME Standardization Workshop. IBM Research Laboratory , Ruschlikon, www.prime-project.eu/events/standardisation-ws2, pp. 1-8.
Number of full-text downloads 273

, , & (2010) Validating denial of service vulnerabilities in web services. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security. IEEE Computer Society, United States, pp. 175-182.
Number of full-text downloads 910
Number of citations in Scopus 16

, , & (2008) Layered identity infrastructure model for identity meta systems. In Miller, M & Brankovic, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008). Australian Computer Society, Australia, pp. 83-92.
Number of full-text downloads 287
Number of citations in Scopus 1

, , & (2007) A User-Centric Federated Single Sign-on System. In Li, K, Qu, W, Jin, H, Cao, Z, & Xiang, Y (Eds.) 2007 IFIP International Conference on Network and Parallel Computing Workshops. IEEE Computer Society, United States of America, pp. 99-106.
Number of full-text downloads 395
Number of citations in Scopus 5
Number of citations in Web of Science® 4

, , & (2008) Conditional privacy using re-encryption. In Zhou, W & Xiang, Y (Eds.) Proceedings of 2008 IFIP International Conference on Network and Parallel Computing. IEEE Computer Society, United States, pp. 18-25.
Number of full-text downloads 331
Number of citations in Scopus 6
Number of citations in Web of Science® 2

, , & (2008) A user-centric protocol for conditional anonymity revocation. In Lioy, A, Furnell, S, & Katsikas, S K (Eds.) Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008, Proceedings [Lecture Notes in Computer Science, Vol5185]. Springer, Germany, pp. 185-194.
Number of citations in Scopus 7
Number of citations in Web of Science® 4

, , , & (2009) Modelling and verification of privacy enhancing protocols. In Breitman, K & Cavalcanti, A (Eds.) Formal Methods and Software Engineering: 11th International Conference on Formal Engineering Methods ICFEM 2009, Proceedings [Lecture Notes in Computer Science, 5885]. Springer, Germany, pp. 127-146.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

, , , , & (2010) Risk modelling the transition of SCADA system to IPv6. In Hilty, L, Berleur, J, & Hercheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328]. Springer, Germany, pp. 384-395.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

& (2010) Reconstruction of falsified computer logs for digital forensics investigations. In Boyd, C & Susilo, W (Eds.) Information Security 2010: Proceedings of the Eight Australasian Information Security Conference [Conferences in Research and Practice in Information Technology, Volume 105]. Australian Computer Society, Australia, pp. 12-21.
Number of full-text downloads 352
Number of citations in Scopus 3

, , & (2006) Early Results in Vision-Based Map Building. In Sitte, J, Murase, K, Kubota, N, Naniwa, T, & Sekiyama, K (Eds.) Proceedings of the 3rd International Symposium on Autonomous Minirobots for Research and Edutainment. Springer, Germany, pp. 207-216.
Number of full-text downloads 663
Number of citations in Scopus 3
Number of citations in Web of Science® 1

, , & (2010) Bias in the nonlinear filter generator output sequence. In Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010. Penerbit Universiti, Malaysia, pp. 40-46.
Number of citations in Scopus 1

, , , & (2009) Analysis of authenticated encryption stream ciphers. In Kozan, E (Ed.) Proceedings of the 20th National Conference of Australian Society for Operations Research and the 5th International Intelligent Logistics System Conferences. QUT Publications / Australian Society for Operations Research, Australia, Queensland, Brisbane, pp. 1-16.
Number of full-text downloads 616

, , Bhaskar, Surinder, , , Raghavan, S., Ravindran, B., , & (2011) Background. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 9-40.
Number of citations in Web of Science® 1

, Chen, Phoebe, & (2005) Extraction and Classification of Self-consumable Sport Video Highlights. In Rhee, S (Ed.) The 4th Asia Pacific International Symposium on Information Technology. APIS, Australia, pp. 200-203.
Number of full-text downloads 283

Tong, Valerie, , & Me, Ludovic (2010) Specifying and enforcing a fine-grained information flow policy: model and experiments. In You, I (Ed.) Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. Jowua, Japan, pp. 56-71.
Number of full-text downloads 280
Number of citations in Scopus 9

, , , & (2007) Cost-Based and Time-Based Analysis of DoS-Resistance in HIP. In Dobbie, G (Ed.) Computer Science 2007: Proceedings of the 30th Australasian Computer Science Conference (CRPIT, Volume 62). Australian Computer Society, Australia, pp. 191-200.
Number of full-text downloads 186
Number of citations in Scopus 7

, , , & (2006) Using Coloured Petri Nets to Simulate DoS-resistant Protocols. In Jensen, K (Ed.) 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools. University of Aarhus, Denmark, pp. 261-280.
Number of full-text downloads 163

, , & (2008) Factor analysis subspace estimation for speaker verification with short utterances. In Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of Interspeech 2008 incorporating SST 2008. Casual Productions Pty Ltd, CD Rom, pp. 853-856.
Number of full-text downloads 874
Number of citations in Scopus 52
Number of citations in Web of Science® 31

, Kajarekar, Sachin, & (2008) Discriminant NAP for SVM speaker recognition. In Brummer, N & du Preez, J (Eds.) Proceedings of Odyssey 2008: The Speaker and Language Recognition Workshop. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 1-6.
Number of full-text downloads 504
Number of citations in Scopus 13

, , & (2008) Factor analysis modelling for speaker verification with short utterances. In Brummer, N & du Preez, J (Eds.) Proceedings of Odyssey 2008: The Speaker and Language Recognition Workshop. Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 1-4.
Number of full-text downloads 537
Number of citations in Scopus 32

, Pelecanos, Jason, Scheffer, Nicholas, Kajarekar, Sachin, & (2009) Within-session variability modelling for factor analysis speaker verification. In Moore, R (Ed.) Proceedings of the 10th Annual Conference of the International Speech Communication Association. International Speech Communication Association, United Kingdom, pp. 1563-1566.
Number of full-text downloads 207
Number of citations in Scopus 9

& (2006) Experiments in Session Variability Modelling for Speaker Verification. In Duhamel, P & Vandendorpe, L (Eds.) Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Conference Management Services Inc, CD Rom, pp. 1-4.
Number of full-text downloads 619
Number of citations in Scopus 34
Number of citations in Web of Science® 8

& (2009) Minimising speaker verification utterance length through confidence based early verification decisions. In Nixon, M S & Tistarelli, M (Eds.) Advances in Biometrics: Third International Conferences, ICB 2009 Proceedings [Lecture Notes in Computer Science, Volume 5558]. Springer, Germany, pp. 454-463.
Number of full-text downloads 209
Number of citations in Scopus 3
Number of citations in Web of Science® 2

, , & (2008) Making confident speaker verification decisions with minimal speech. In Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of Interspeech 2008 incorporating SST 2008. Casual Productions Pty Ltd, CD-Rom, pp. 1405-1408.
Number of full-text downloads 911
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Vu, Ngoc-Vinh, Ye, Hua, Whittington, Jim, Devlin, John, & (2010) Small footprint implementation of dual-microphone delay-and-sum beamforming for in-car speech enhancement. In Hansen, J H L (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1482-1485.
Number of citations in Scopus 21
Number of citations in Web of Science® 14

, , , & (2009) The effect of language models on phonetic decoding for spoken term detection. In Larson, M, deJong, F, Kohler, J, Kraaij, W, & Ordelman, R (Eds.) Proceedings of the third workshop on searching spontaneous conversational speech. Association for Computing Machinery (ACM), United States, pp. 31-36.
Number of full-text downloads 341
Number of citations in Scopus 7

, Thambiratnam, Kit, & Seide, Frank (2009) Unsupervised speaker adaptation for telephone call transcription. In Lee, L (Ed.) Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 4393-4396.
Number of full-text downloads 276
Number of citations in Scopus 7
Number of citations in Web of Science® 4

, , , & (2010) Optimising figure of merit for phonetic spoken term detection. In Hansen, J H L (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 5298-5301.
Number of full-text downloads 450
Number of citations in Scopus 23
Number of citations in Web of Science® 13

, , & (2009) Spoken term detection using fast phonetic decoding. In Lee, L (Ed.) Proceedings from the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing. Institute of Electrical and Electronics Engineers Inc., United States, pp. 4881-4884.
Number of full-text downloads 652
Number of citations in Scopus 21
Number of citations in Web of Science® 9

, , & (2007) A Phonetic Search Approach to the 2006 NIST Spoken Term Detection Evaluation. In van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). Causal Productions Pty Ltd, CD Rom, pp. 2385-2388.
Number of full-text downloads 931
Number of citations in Scopus 20

, , , & (2008) Automatic audio segmentation using the Generalized Likelihood Ratio. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems, 2008. DSP for Communication Systems / IEEE, CD Rom, pp. 1-5.
Number of full-text downloads 227
Number of citations in Scopus 15

, , & (2010) Bayes factor based speaker clustering for speaker diarization. In Baker, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010. Institute of Electrical and Electronics Engineers Inc., United States, pp. 61-64.
Number of full-text downloads 245
Number of citations in Scopus 4
Number of citations in Web of Science® 2

, , & (2010) Bayes factor based speaker segmentation for speaker diarization. In Hirose, K, Nakamura, S, & Kobayashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association. International Speech Communication Association, Japan, pp. 1405-1408.
Number of full-text downloads 356
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Wang, Dong, , Frankel, Joe, & King, Simon (2008) A posterior approach for microphone array based speech recognition. In Burnham, D (Ed.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST). International Speech Communication Association, CD Rom, pp. 996-999.

, , & (2010) Overcoming reputation and proof-of-work systems in botnets. In Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) 2010 Fourth International Conference on Network and System Security. IEEE Computer Society, United States, pp. 120-127.
Number of full-text downloads 444
Number of citations in Scopus 2

Whittington, Jim, Deo, Kapeel, , & (2008) FPGA Implementation of Spectral Subtraction for In-Car Speech Enhancement and Recognition. In Wysock, T & Wysocki, B (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communications Systems. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-8.
Number of full-text downloads 880
Number of citations in Scopus 11

Whittington, Jim, Ye, Hua, Kamalakannan, K, Vu, Ngoc-Vinh, , , & (2010) Low-cost hardware speech enhancement for improved speech recognition in automotive environments. In Doyle, N (Ed.) The 24th ARRB Conference Proceedings. ARRB Group Ltd., CD Rom, pp. 1-17.
Number of full-text downloads 467

& Bard, Gregory (2010) Improved algebraic cryptanalysis of QUAD, Bivium and trivium via graph partitioning on equation systems. In Hawkes, P & Steinfeld, R (Eds.) Information Security and Privacy: 15th Australasian Conference, ACISP 2010 Proceedings [Lecture Notes in Computer Science, Volume 6168]. Springer, Germany, pp. 19-36.
Number of full-text downloads 615
Number of citations in Scopus 5
Number of citations in Web of Science® 1

, , & (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, C & Susilo, W (Eds.) Information Security 2010. Australian Computer Society, Australia, pp. 73-80.
Number of full-text downloads 503
Number of citations in Scopus 5

, , & (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Muller, W, Winkler, R, Goldstern, M, & Eigenthaler, G (Eds.) Contributions to General Algebra 17. Verlag Johannes Heyn, Germany, pp. 201-216.

, , & (2005) Geometrically Robust Digital Image Watermarking Using Scale Normalisation and Flowline Curvature. In III, Edward J Delp & Wong, Ping Wah (Eds.) Security, Stenography, and Watermarking of Multimedia Contents VII. SOIE & IS&T (co-published), USA, pp. 528-538.
Number of full-text downloads 780
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , & (2005) Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. In Lovell, B & Maeder, A (Eds.) Workshop Proceedings: WDIC 2005 APRS Workshop on Digital Image Computing. University of Queensland, Australia, Queensland, Brisbane, pp. 43-48.
Number of full-text downloads 2,093

, , & (2005) Performance Factors Analysis of Wavelet-Based Watermarking Method. In Buyya, R, Montague, P, & Coddington, P (Eds.) ACSW Frontiers 2005. Australian Computer Society, Australia, New South Wales, Sydney, pp. 89-98.
Number of full-text downloads 740
Number of citations in Scopus 15

, Raddum, Havard, Henricksen, Matthew, & (2008) Bit-pattern based integral attack. In Nyberg, Kaisa (Ed.) Fast Software Encryption: 15th International Workshop, FSE 2008 Revised Selected Papers [Lecture Notes in Computer Science, Volume 5086]. Springer, Germany, pp. 363-381.
Number of citations in Scopus 66
Number of citations in Web of Science® 42

, Raddum, Havard, , , Henricksen, Matthew, & (2009) Algebraic analysis of LEX. In Susilo, W & Brankovic, L (Eds.) Information Security 2009 : proceedings of the 7th Australasian Information Security Conference. Australian Computer Society, Australia, pp. 33-45.
Number of full-text downloads 201
Number of citations in Scopus 2

, , , & (2010) Linearity within the SMS4 block cipher. In Bao, F, Lin, D, Yung, M, & Jing, J (Eds.) Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Revised Selected Papers [Lecture Notes in Computer Science, Volume 6151]. Springer, Germany, pp. 248-265.
Number of full-text downloads 486
Number of citations in Scopus 1

, , , & (2010) Algebraic analysis of small scale LEX-BES. In Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010. Penerbit Universiti, Malaysia, pp. 77-82.
Number of full-text downloads 210
Number of citations in Scopus 2

, , , Pouget, Fabien, & Dacier, Marc (2005) The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. In Huang, M Y (Ed.) Proceedings, First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005. IEEE Computer Society, United States of America, pp. 89-104.
Number of full-text downloads 258
Number of citations in Scopus 11
Number of citations in Web of Science® 5

& (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54]. Australian Computer Society, Australia, pp. 89-96.
Number of citations in Scopus 4

Contribution to Journal

& Lhee, Kyung-Suk (2011) Classification of packet contents for malware detection. Journal of Computer Virology and Hacking Techniques, 7(4), pp. 279-295.
Number of citations in Scopus 19
Number of citations in Web of Science® 17

, Batten, Lynn, Colbert, Bernard, & (2006) Algebraic Attacks on Clock-Controlled Stream Ciphers. Lecture Notes in Computer Science, 4058, Article number: AISP 1-16.
Number of citations in Scopus 16
Number of citations in Web of Science® 14

, , Henricksen, Matthew, & (2007) On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Lecture Notes in Computer Science, 4586, Article number: AISP 11-28.
Number of full-text downloads 398
Number of citations in Scopus 10
Number of citations in Web of Science® 7

, , & (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Number of full-text downloads 248
Number of citations in Scopus 8

Babbage, Steve, Cid, Carlos, Pramstaller, Norbert, & (2007) An Analysis of the Hermes8 Stream Ciphers. Lecture Notes in Computer Science, 4586, Article number: AISP 1-10.
Number of full-text downloads 226
Number of citations in Scopus 1

, , , & Knight, Alistair (2007) Intelligence and Anticipation: Issues in Security, Risk and Crisis Management. International Journal of Risk Assessment and Management, 7(8), pp. 1209-1223.
Number of full-text downloads 889
Number of citations in Scopus 1

, , , , , , , & (2006) Towards Secure and Legal E-Tendering. Journal of Information Technology in Construction, 11(e-Commerce in Construction), pp. 89-102.
Number of full-text downloads 2,040
Number of citations in Scopus 52
Number of citations in Web of Science® 25

& (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science, 3715, pp. 229-243.
Number of full-text downloads 432
Number of citations in Scopus 60
Number of citations in Web of Science® 52

, , & Mathuria, Anish (2006) An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. Lecture Notes in Computer Science, 4058, Article number: AISP 371-382.
Number of full-text downloads 549
Number of citations in Scopus 10
Number of citations in Web of Science® 5

, , , & Paterson, Kenneth (2009) One-round key exchange in the standard model. International Journal of Applied Cryptography, 1(3), pp. 181-199.
Number of full-text downloads 308
Number of citations in Scopus 37

, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science, 3364, Article number: IWSP 255-271.
Number of citations in Scopus 18
Number of citations in Web of Science® 5

, , & (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Lecture Notes in Computer Science, 4301, Article number: CANS 1-18.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , & (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Lecture Notes in Computer Science, 4329, Article number: INDOCRYPT 176-190.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

(2009) Commercializing public sector information: privacy and security concerns. IEEE Technology and Society Magazine, 28(1), pp. 34-40.
Number of full-text downloads 458
Number of citations in Scopus 9
Number of citations in Web of Science® 7

(2010) Privacy invasive geo-mashups: privacy 2.0 and the limits of first generation information privacy laws. University of Illinois Journal of Law, Technology and Policy, 2010(1), pp. 1-50.
Number of full-text downloads 8

, , & von Nessen, Paul (2010) The mandatory notification of data breaches: Issues arising for Australian and EU legal developments. Computer Law and Security Review, 26(2), pp. 115-129.
Number of full-text downloads 508
Number of citations in Scopus 10

, , & (2010) Encryption safe harbours and data breach notification laws. Computer Law and Security Review, 26(5), pp. 520-534.
Number of full-text downloads 416
Number of citations in Scopus 4

(2007) Application Security - Myth or Reality? Lecture Notes in Computer Science, 4464, Article number: ISPEC 1-10.

, , Kwok, Lam For, & (2006) A Model to Support Information Security Governance. Information Risk Management & Audit Journal, 16(1), pp. 7-24.

, , & (2005) High Trust Integrity Controls. Information Risk Management & Audit Journal, 15(3), pp. 5-8.

, , , , , , Lee, Hoo-Jae, & Moon, Sang-Jae (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science, 3506, Article number: ICISC 33-50.
Number of full-text downloads 443
Number of citations in Scopus 15

(2005) Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security, 1(3), pp. 154-159.
Number of citations in Scopus 22

(2006) Revisiting Lee, Kim & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security, 2(1), pp. 64-68.
Number of citations in Scopus 4

, , & (2005) Errors in Computational Complexity Proofs for Protocols. Lecture Notes in Computer Science, 3788, Article number: ASIACRYPT 624-643.
Number of full-text downloads 653
Number of citations in Scopus 72
Number of citations in Web of Science® 54

, , & (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788, Article number: ASIACRYPT 585-604.
Number of full-text downloads 854
Number of citations in Scopus 133
Number of citations in Web of Science® 98

, , & (2005) On Session Key Construction in Provably-Secure Key Establishment Protocols. Lecture Notes in Computer Science, 3715, pp. 116-131.
Number of full-text downloads 438
Number of citations in Scopus 42
Number of citations in Web of Science® 22

Chow, Sherman, , & (2006) Security-Mediated Certificateless Cryptography. Lecture Notes in Computer Science, 3958, Article number: PKC 508-524.
Number of full-text downloads 488
Number of citations in Scopus 66
Number of citations in Web of Science® 59

Chua, K, , Acharya, Rajendra, & Lim, C.M. (2008) Cardiac state diagnosis using higher order spectra of heart rate variability. Journal of Medical Engineering and Technology, 32(2), pp. 145-155.
Number of citations in Scopus 125

Chua, K, , Acharya, Rajendra, & Lim, C.M. (2008) Computer-based analysis of cardiac state using entropies, recurrence plots and poincare geometry. Journal of Medical Engineering and Technology, 32(4), pp. 263-272.
Number of citations in Scopus 27

, , & (2006) Password Based Server Aided Key Exchange. Lecture Notes in Computer Science, 3989, Article number: ACNS 146-161.
Number of full-text downloads 354
Number of citations in Scopus 13
Number of citations in Web of Science® 9

Clutterbuck, Peter, , & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.

, , & (2007) Multiscale Representation for 3-D Face Recognition. IEEE Transactions on Information Forensics and Security, 2(3), pp. 529-536.
Number of citations in Scopus 15
Number of citations in Web of Science® 8

, , , & (2007) Robust 3D Face Recognition from Expression Categorisation. Lecture Notes in Computer Science, 4642, Article number: ICB 2007 271-280.
Number of full-text downloads 423
Number of citations in Scopus 8
Number of citations in Web of Science® 5

, Lange, Tania, & Naehrig, Michael (2010) Faster pairing computations on curves with high-degree twists. Lecture Notes in Computer Science, 6056, Article number: PKC 224-242.
Number of full-text downloads 531
Number of citations in Scopus 76
Number of citations in Web of Science® 45

& (2005) Designing Copyright TPM: A Mutant Digital Copyright. International Journal of Law and Information Technology, 13(2), pp. 155-187.
Number of citations in Scopus 3
Number of citations in Web of Science® 6

& (2008) Identifying the Identity Thief: Is It Time for a (Smart) Australia Cards? International Journal of Law and Information Technology, 16(2), pp. 125-158.
Number of citations in Scopus 7
Number of citations in Web of Science® 2

& (2007) Investigating Risk Exposure in E-Health Systems. International Journal of Medical Informatics, 76(5-6), pp. 460-465.
Number of full-text downloads 774
Number of citations in Scopus 31
Number of citations in Web of Science® 15

, , & (2007) An Adaptive Optical Flow Technique for Person Tracking Systems. Pattern Recognition Letters, 28(10), pp. 1232-1239.
Number of full-text downloads 1,374
Number of citations in Scopus 78
Number of citations in Web of Science® 49

, , , , & (2010) Multi-spectral fusion for surveillance systems. Computers and Electrical Engineering, 36(4), pp. 643-663.
Number of full-text downloads 317
Number of citations in Scopus 26
Number of citations in Web of Science® 24

, , & (2006) A Secure E-Tender Submission Protocol. Lecture Notes in Computer Science, 4083, Article number: TrustBus 213-222.
Number of full-text downloads 498

, , & (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , , & (2005) Designing Secure E-Tendering Systems. Lecture Notes in Computer Science, 3592, Article number: TrustBus 70-79.
Number of citations in Scopus 10
Number of citations in Web of Science® 9

, , & (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing, 23(3), pp. 201-218.
Number of citations in Scopus 21
Number of citations in Web of Science® 17

, Hirose, Shoichi, & Annadurai, Suganya (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.

& Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. Lecture Notes in Computer Science, 4964, Article number: RSA 36-51.
Number of citations in Scopus 26
Number of citations in Web of Science® 23

, , , & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. Lecture Notes in Computer Science, 4058, Article number: AISP 407-420.
Number of citations in Scopus 25
Number of citations in Web of Science® 21

(2010) Copyright liability for users and distribution. Information and Communications Technology Law, 19(1), pp. 1-26.
Number of citations in Scopus 1

, , , & (2005) An Improved Execution Integrity Solution for Mobile Agents. Lecture Notes in Computer Science, 3574, Article number: AISP 170-183.

, , & (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology research, 2(1), pp. 89-99.
Number of full-text downloads 120

, , & (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 788
Number of citations in Scopus 13

Ha, Jae-Cheol, Kim, Hwan-Koo, Park, Jea-Hoon, Moon, Sang-Jae, , & (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, Article number: USN 2007 557-567.
Number of citations in Scopus 5

Ha, Jae-Cheol, Moon, Sang-Jae, , & (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, Article number: EUC 795-807.
Number of citations in Scopus 26
Number of citations in Web of Science® 17

Ha, Jae-Cheol, Moon, Sang-Jae, , & (2007) Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). Lecture Notes in Computer Science, 4819, Article number: SSDU 2007 574-583.
Number of full-text downloads 207
Number of citations in Scopus 13
Number of citations in Web of Science® 9

& (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP 52-63.
Number of full-text downloads 229
Number of citations in Scopus 1

& (2006) Rekeying Issues in the MUGI Stream Cipher. Lecture Notes in Computer Science, 3897, Article number: SELCRYP 175-188.
Number of full-text downloads 322
Number of citations in Scopus 5
Number of citations in Web of Science® 3

, , & (2011) Clustered blind beamforming from ad-hoc microphone arrays. IEEE Transactions on Audio, Speech and Language Processing, 19(4), pp. 661-676.
Number of full-text downloads 659
Number of citations in Scopus 61
Number of citations in Web of Science® 47

, , & (2007) New Formulae for Efficient Elliptic Curve Arithmetic. Lecture Notes in Computer Science, 4859, Article number: INDOCRYPT 138-151.
Number of full-text downloads 1,062
Number of citations in Scopus 36
Number of citations in Web of Science® 20

, , & (2006) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communication and Computing, 16(6), pp. 405-438.
Number of full-text downloads 144
Number of citations in Scopus 7
Number of citations in Web of Science® 4

, Gray, Elizabeth, & Kinateder, Michael (2006) Simplification and Analysis of Transitive Trust Networks. Web Intelligence, 4(2), pp. 139-161.
Number of citations in Scopus 158

, , & (2007) A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), pp. 618-644.
Number of full-text downloads 13,356
Number of citations in Scopus 2,680
Number of citations in Web of Science® 1,818

, Marsh, Stephen, & Pope, Simon (2006) Exploring Different Types of Trust Propagation. Lecture Notes in Computer Science, 3986, Article number: iTrust 179-192.
Number of citations in Scopus 111
Number of citations in Web of Science® 77

, , & (2009) A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software, 82(2), pp. 270-273.
Number of citations in Scopus 93
Number of citations in Web of Science® 66

, , , & (2010) Transaction mining for fraud detection in ERP systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 906
Number of citations in Web of Science® 5

Lee, Sanggon, , Park, Youngho, & Moon, Sang-Jae (2006) Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Lecture Notes in Computer Science, 3897, Article number: SELCRYP 205-220.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , & (2005) Alternative intellectual property systems for the digital age. Media International Australia, 2005(114), pp. 87-98.
Number of full-text downloads 1,029

Lopez, Javier, Montenegro, Jose, Vivas, Jose, Okamoto, Eiji, & (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 22
Number of citations in Web of Science® 15

, , & von Nessen, Paul (2010) Notification of data breaches under the continuous disclosure regime. Australian Journal of Corporate Law, 25(1), pp. 70-100.
Number of full-text downloads 1,023

, Cohn, Jeffrey, Matthews, Iain, , , , & Prkachin, Kenneth (2011) Automatically detecting pain in video through facial action units. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 41(3), pp. 664-674.
Number of citations in Scopus 211
Number of citations in Web of Science® 158

Macfarlane, John Cameron, , , & Pegrum, C. M. (2009) Simulation and measurement of HTS Josephson heterodyne oscillator. IEEE Transactions on Applied Superconductivity, 19(3), pp. 920-923.
Number of citations in Scopus 16
Number of citations in Web of Science® 11

Maganti, Hari, Gatica-Perez, Daniel, & (2007) Speech Enhancement and Recognition in Meetings With an Audio-Visual Sensor Array. IEEE Transactions on Audio, Speech and Language Processing, 15(8), pp. 2257-2269.
Number of full-text downloads 642
Number of citations in Scopus 48
Number of citations in Web of Science® 35

, , & (2006) What Is the Average Human Face? Lecture Notes in Computer Science, 4319, Article number: PSIVT 692-701.
Number of full-text downloads 355
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , & (2009) Design of automatic vision-based inspection system for solder joint segmentation. Journal of Achievements in Materials and Manufacturing Engineering, 34(2), pp. 145-151.
Number of full-text downloads 3,090

& (2006) Information Protection Management Structures in Australian E-Courts. Journal of Theoretical and Applied Electronic Commerce Research, 1(3), pp. 58-67.

& (2006) A Model for Improving E-Security in Australian Universities. Journal of Theoretical and Applied Electronic Commerce Research, 1(2), pp. 90-97.
Number of citations in Scopus 5

, Lincoln, Mike, & (2008) Microphone array shape calibration in diffuse noise fields. IEEE Transactions on Audio, Speech and Language Processing, 16(3), pp. 666-670.
Number of citations in Scopus 76
Number of citations in Web of Science® 63

& (2005) Who Goes There? Internet Banking: A Matter of Risk and Reward. Lecture Notes in Computer Science, 3574, Article number: AISP 336-357.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , , & (2010) Data-driven background dataset selection for SVM-based speaker verification. IEEE Transactions on Audio, Speech and Language Processing, 18(6), pp. 1496-1506.
Number of full-text downloads 296
Number of citations in Scopus 15
Number of citations in Web of Science® 13

, , & (2007) SVM Speaker Verification Using Session Variability Modelling and GMN Supervectors. Lecture Notes in Computer Science, 4642, Article number: ICB 2007 1077-1084.
Number of full-text downloads 326
Number of citations in Scopus 6
Number of citations in Web of Science® 2

(2005) New Cryptographic Applications of Boolean Function Equivalence Classes. Lecture Notes in Computer Science, 3574, Article number: AISP 572-584.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Muhlbauer, Adam, , Safavi-Naini, Reihaneh, , & Surminen, Martin (2008) Location constraints in digital rights management. Computer Communications, 31(6), pp. 1173-1180.
Number of full-text downloads 295
Number of citations in Scopus 12
Number of citations in Web of Science® 4

, , & (2006) Gaze Tracking for Region of Interest Coding in JPEG 2000. Signal Processing: Image Communication, 21(5), pp. 359-377.
Number of full-text downloads 92
Number of citations in Scopus 16
Number of citations in Web of Science® 11

, , & (2006) Gaze-J2K: Gaze-Influenced Image Coding Using Eye Trackers and JPEG 2000. Journal of Telecommunications and Information Technology, 1, pp. 1-8.

Peng, Kun, Bao, Feng, & (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 14
Number of citations in Scopus 8
Number of citations in Web of Science® 5

, , & (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 306
Number of citations in Scopus 19
Number of citations in Web of Science® 12

, , & (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 30
Number of citations in Web of Science® 16

, , & (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science, 3650, Article number: ISC 374-388.
Number of full-text downloads 407
Number of citations in Scopus 17
Number of citations in Web of Science® 8

, , & (2005) Simple and Efficient Shuffling with provable Correctness and ZK Privacy. Lecture Notes in Computer Science, 3621, Article number: CRYPTO 188-204.
Number of full-text downloads 234
Number of citations in Scopus 44
Number of citations in Web of Science® 24

, , , & Lee, Byoungcheon (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. Lecture Notes in Computer Science, 3783, Article number: ICICS 84-96.
Number of full-text downloads 715
Number of citations in Scopus 14
Number of citations in Web of Science® 11

, , , & (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, 3506, Article number: ICISC 51-66.
Number of full-text downloads 404
Number of citations in Scopus 6

, , , & Okamoto, Eiji (2006) A Novel Range Test. Lecture Notes in Computer Science, 4058, Article number: AISP 247-258.
Number of full-text downloads 165
Number of citations in Scopus 9
Number of citations in Web of Science® 5

Peng, Kun, , & Bao, Feng (2011) Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. International Journal of Information Security, 10(1), pp. 33-47.
Number of citations in Scopus 14
Number of citations in Web of Science® 8

& (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auctions. Lecture Notes in Computer Science, 4464, Article number: ISPEC 209-224.
Number of full-text downloads 268
Number of citations in Scopus 13
Number of citations in Web of Science® 9

, , Desmedt, Yvo, & (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. Lecture Notes in Computer Science, 4296, Article number: ICISC 296-309.
Number of full-text downloads 368
Number of citations in Scopus 3
Number of citations in Web of Science® 3

, , & (2007) Consistency of User Attribute in Federated Systems. Lecture Notes in Computer Science, 4657, Article number: TrustBus 165-177.
Number of full-text downloads 263
Number of citations in Scopus 3
Number of citations in Web of Science® 1

, , , & (2010) On a taxonomy of delegation. Computers and Security, 29(5), pp. 565-579.
Number of full-text downloads 297
Number of citations in Scopus 10
Number of citations in Web of Science® 3

Pouget, Fabien, Dacier, Marc, , , & (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.
Number of citations in Web of Science® 12

& Semaev, Igor (2008) Solving MRHS linear equations. Designs, Codes and Cryptography, 49(1-3), pp. 147-160.
Number of citations in Scopus 32
Number of citations in Web of Science® 25

, , & (2010) Towards authorisation models for secure information sharing: a survey and research agenda. ISeCure The ISC International Journal of Information Security, 2(2), pp. 69-87.
Number of full-text downloads 337
Number of citations in Web of Science® 6

(2010) The inadequacy of embedded markup for cultural heritage texts. Digital Scholarship in the Humanities, 25(3), pp. 337-356.
Number of full-text downloads 654
Number of citations in Scopus 28
Number of citations in Web of Science® 13

& Fiormonte, Domenico (2010) Multi-version documents : A digitisation solution for textual cultural artefacts. Intelligenza artificiale, IV(1), pp. 57-61.
Number of full-text downloads 325

& (2006) Improved Cryptanalysis of MAG. Lecture Notes in Computer Science, 4058, Article number: AISP 64-75.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

, , , , & (2007) Denial-of-Service Resistance in Key Establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 423
Number of citations in Scopus 7

& Theriault, Nicolas (2006) Unified point addition formula and side-channel attacks. Lecture Notes in Computer Science, 4249, Article number: CHES 2006 354-368.
Number of citations in Scopus 25

Steletee, Chris, , , & Montague, Paul (2005) GBD Threshold Cryptography With an Application to RSA Key Recovery. Lecture Notes in Computer Science, 3574, Article number: AISP 394-405.
Number of full-text downloads 401
Number of citations in Scopus 2

, , & (2009) A user-centric federated single sign-on system. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 804
Number of citations in Scopus 42
Number of citations in Web of Science® 29

Tang, Qiang & (2006) Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. Lecture Notes in Computer Science, 3989, Article number: ACNS 162-177.
Number of full-text downloads 702
Number of citations in Scopus 17
Number of citations in Web of Science® 11

, , & (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology research, 2(1), pp. 27-37.
Number of full-text downloads 185

, , & (2006) Ubiquitous Authorization Scheme Based On Device Profile. Lecture Notes in Computer Science, 4097, pp. 312-321.

, , , & (2006) Examining the DOS Resistance to HIP. Lecture Notes in Computer Science, 4277, Article number: OTM 2006 616-625.
Number of full-text downloads 256
Number of citations in Scopus 2
Number of citations in Web of Science® 1

, , , & (2007) Toward Non-Parallelizable Client Puzzles. Lecture Notes in Computer Science, 4856, Article number: CANS 247-264.
Number of full-text downloads 888
Number of citations in Scopus 30
Number of citations in Web of Science® 19

Tso, Raylin, , Okamoto, Takeshi, , & Okamoto, Eiji (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

& (2008) Explicit modelling of session variability for speaker verification. Computer Speech and Language, 22(1), pp. 17-38.
Number of full-text downloads 86
Number of citations in Scopus 100
Number of citations in Web of Science® 79

, , & (2010) Making confident speaker verification decisions with minimal speech. IEEE Transactions on Audio, Speech and Language Processing, 18(6), pp. 1182-1192.
Number of citations in Scopus 35
Number of citations in Web of Science® 19

, , , & (2011) Discriminative optimisation of the figure of merit for phonetic spoken term detection. IEEE Transactions on Audio, Speech and Language Processing, 19(6), pp. 1677-1687.
Number of full-text downloads 353
Number of citations in Scopus 10
Number of citations in Web of Science® 7

, Colbert, Bernard, Batten, Lynn, & (2006) Algebraic Attacks on Clock-Controlled Cascade Ciphers. Lecture Notes in Computer Science, 4329, Article number: INDOCRYPT 32-47.
Number of citations in Scopus 6
Number of citations in Web of Science® 5

, , & (2006) Geometric Invariant Domain for Image Watermarking. Lecture Notes in Computer Science, 4283, Article number: IWDW 294-307.
Number of full-text downloads 941
Number of citations in Scopus 12
Number of citations in Web of Science® 8

, , , & (2005) System Architecture Analysis of a Hybrid Watermarking Method. Lecture Notes in Computer Science, 3682, Article number: KES 1145-1151.
Number of full-text downloads 615

, , & (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. Lecture Notes in Computer Science, 3574, Article number: AISP 158-169.
Number of citations in Scopus 4
Number of citations in Web of Science® 4

, , , & (2010) Algebraic analysis of small scale LEX-BES. International Journal of Cryptology research, 2(1), pp. 51-62.

Conference [Discontinued]

(2010) Temporal-based support vector machines for facial expression recognition. In AutoCRC Student Conference 2010, 27 July 2010, Melbourne.
Number of full-text downloads 182

Contribution to conference

, Samad, Kashan, & Mahmood, Waqar (2006) Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks. In Asia Pacific Information Technology Security Conference (AUSCERT2006), 2006-05-01 - 2006-05-01.
Number of full-text downloads 503

Andersson, Gunnar, , Willett, Graham, & Hauge, Bjørn Gitle (2013) Bringing skills and general competences back into technological education. In NHIBE 2013 8th International Conference on New Horizons in Industry, Business and Education, 2013-08-29 - 2013-08-30.
Number of full-text downloads 73

, , & Chang, She-I (2013) Identity, addressing, authenticity and audit requirements for trust in ERP, analytics and big/open data in a “Cloud” computing environment : a review and proposal. In 2013 Forensic Accounting and Personal Information Protection International Forum, 2013-11-22 - 2013-11-23. (Unpublished)
Number of full-text downloads 243

, , & Chang, She-I (2014) Trust in merged ERP and open data schemes in the “Cloud”. In 2014 International Conference on Accounting and Information Technology, 2014-02-21 - 2014-02-23. (Unpublished)
Number of full-text downloads 319

& Broadhurst, Roderic (2008) Social engineering and crime prevention in cyberspace. In Proceedings of the Korean Institute of Criminology, 2008-11-01 - 2008-11-01.
Number of full-text downloads 4,639

Chapman, S.C., Mathews, K.L., Cooper, M., Jensen, N.M., Wang, E., Butler, D.G., Sheppard, J.A., & (2001) Using environment characterization to interpret wheat yield in water-limited environments. In 10th Assembly of the Wheat Breeding Society fo Australian Inc., 2001-09-16 - 2001-09-21.

, , , & (2010) Information sharing in the 21st century: progress and challenges. In Eighth Australasian Information Security Conference, 2010-01-18 - 2010-01-21.

, , & (2007) Robust real time multi-layer foreground segmentation. In International Association for Pattern Recognition Conference on Machine Vision Applications, 2007-05-16 - 2007-05-18.
Number of full-text downloads 123
Number of citations in Scopus 4

, , & (2011) Information accountability for online healthcare social networks. In International Conference on Innovation and Management, IAM 2011, 2011-07-12 - 2011-07-15.
Number of full-text downloads 197

& (2014) Implementing a new genre of eHealth system in a reticent environment. In 16th International Conference on E-health Networking, Application & Services, 2014-10-15 - 2014-10-18. (Unpublished)
Number of full-text downloads 226

, , Lane, Bill, & (2013) Designing an information accountability framework for eHealth. In IEEE Healthcom 2013 15th International Conference on E-Health Networking, Application & Services, 2013-10-09 - 2013-10-12.
Number of full-text downloads 86

, , , & Lane, William B. (2014) 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth. In 16th International Conference on E-health Networking, Application & Services, 2014-10-15 - 2014-10-18. (Unpublished)
Number of full-text downloads 56

, Yapa, Roshan Dharshana, & Hewavithana, Badra (2009) Comparison of standard image segmentation methods for segmentation of brain tumors from 2D MR images. In 4th International Conference on Industrial and Information Systems (ICIIS 2009), 2009-12-28 - 2009-12-31.
Number of full-text downloads 791
Number of citations in Scopus 32
Number of citations in Web of Science® 15

Iqbal, Ahmed Ali, Mahmood, Waqar, & (2005) TCP-DR an effective protocol for infrastructure based wireless networks. In International Conference on Wireless Networks, 2005-06-27 - 2005-06-30.
Number of full-text downloads 113
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Iqbal, Ahmed Ali, Mahmood, Waqar, , & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Fourth International Conference on the Optical Internet, 2005-05-01 - 2005-05-01.
Number of full-text downloads 233

, Nieto, Juan Gonzalez, & (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 2012-12-12 - 2012-12-13.
Number of full-text downloads 155

, , , , & (2007) Current Approaches to Secure Health Information Systems are NOT Sustainable: An Analysis. In 12th World Congress on Health (Medical) Informatics, 2007-08-20 - 2007-08-24.
Number of full-text downloads 187

, , & (2006) Ensuring the integrity of the E-court process. In Justice Environments Conference 2006, 2006-04-20 - 2006-04-22. (Unpublished)
Number of full-text downloads 1,262

, , & (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 2011-06-30 - 2011-06-30. (Unpublished)
Number of full-text downloads 271

Nugawela, Saliya & (2011) Barriers to the adoption of health information technology. In International Conference on Innovation and Management (IAM) 2011, 2011-07-12 - 2011-07-15. (Unpublished)
Number of full-text downloads 219

(2009) A matter of confidence : privacy compliance for connected-up enterprises. In 2nd International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2009), 2009-09-01 - 2009-09-01. (Unpublished)

, Chang, Chee Fon, Krishna, Aneesh, & Ghose, Aditya (2005) Towards executable specification : combining i* and AgentSpeak(L). In 17th International Conference on Software Engineering and Knowledge Engineering, 2005-07-14 - 2005-07-16.
Number of full-text downloads 133
Number of citations in Scopus 11

, , & Safavi-Naini, Rei (2007) Enforcing P3P policies using a digital rights management system. In 7th International Symposium Privacy Enhancing Technologies, 2007-06-20 - 2007-06-22.
Number of full-text downloads 266
Number of citations in Scopus 11

, , & Safavi-Naini, Rei (2007) Using SITDRM for Privacy Rights Management. In 1st ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT 2007), 2007-03-30 - 2007-03-31.
Number of full-text downloads 299

Samad, Kashan, , Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Student Conference on Engineering Sciences and Technology, 2005-08-27 - 2005-08-27.
Number of full-text downloads 151
Number of citations in Scopus 2

Shafiq, Mohammed O., Ali, Arshad, , Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In 23rd IASTED International Multi Conference on Applied Informatics : Parallel and Distributed Computing and Networks (PDCN), 2005-02-01 - 2005-02-28.
Number of full-text downloads 141

Sheikh, Riaz A., Sharif, Kashif, & (2005) Performance analysis of unified enterprise application security framework. In Student Conference on Engineering Sciences and Technology 2005, 2005-08-27 - 2005-08-27.
Number of full-text downloads 351

Thomas, Rod, , & Griggs, Lynden (2012) Land fraud and inappropriate dealings in an electronic environment : An Australian and New Zealand perspective. In The 11th Australasian Property Law Teachers Conference, 2012-07-12 - 2012-07-13. (Unpublished)
Number of full-text downloads 813

Wark, T., , & (2000) The use of temporal speech and lip information for multi-modal speaker identification via multi-stream HMMs. In 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2000-06-05 - 2000-06-09.
Number of full-text downloads 344
Number of citations in Scopus 22

, , & (2003) Enhancing the security of Internet applications using location : a new model for tamper-resistant GSM location. In Proceedings of the Eighth IEEE International Symposium on Computers and Communication, 2003-06-30 - 2003-07-03.
Number of full-text downloads 484
Number of citations in Scopus 11
Number of citations in Web of Science® 7

Report [Discontinued]

, , & (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology.
Number of full-text downloads 99

, , & (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology.
Number of full-text downloads 437

QUT Thesis

(2012) Analysis of stream cipher based authenticated encryption schemes. PhD thesis, Queensland University of Technology.
Number of full-text downloads 603

(2005) Secure electronic voting with flexible ballot structure. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,660

(2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,951

(2007) Algebraic attacks on clock-controlled stream ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,331
Number of citations in Web of Science® 14

(2010) Combating computer crime : an international perspective. PhD thesis, Queensland University of Technology.
Number of full-text downloads 10,932

(2009) Using honeypots to analyse anomalous Internet activities. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,565

(2012) An examination of keystroke dynamics for continuous user authentication. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,269

(2011) Secure data aggregation in wireless sensor networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,786
Number of citations in Web of Science® 8

(2009) Detecting and characterising malicious executable payloads. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,039

(2012) A risk simulation framework for information infrastructure protection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,374

(2007) Secure public-key encryption from factorisation-related problems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 610

(2011) Improving information security management in nonprofit organisations. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,080

(2005) Maximizing the Availability of Distributed Software Services. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,228

(2012) Fast formulas for computing cryptographic pairings. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,230

(2008) Secure communications for critical infrastructure control systems. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 2,522

(2007) Secure electronic tendering. PhD thesis, Queensland University of Technology.
Number of full-text downloads 3,075

(2007) Cryptographic hash functions : cryptanalysis, design and applications. PhD thesis, Queensland University of Technology.
Number of full-text downloads 7,552

(2009) Intrusion detection techniques in wireless local area networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,560

(2010) Intrusion detection framework for encrypted networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 423
Number of citations in Web of Science® 6

(2010) Design and analysis of group key exchange protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,441

(2005) Novel methods for primality testing and factoring. PhD thesis, Queensland University of Technology.
Number of full-text downloads 821

(2005) Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 4,448

(2010) Elliptic curves, group law, and efficient computation. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,544

(2012) Modelling client puzzles and denial-of-service resistant protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 443
Number of citations in Web of Science® 20

(2010) Encryption schemes and key exchange protocols in the certificateless setting. PhD thesis, Queensland University of Technology.
Number of full-text downloads 937

(2004) Visually sealed and digitally signed electronic documents : building on Asian tradition. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 1,037

(2011) An architecture for enhanced assurance in e-health systems. PhD by Publication, Queensland University of Technology.
Number of full-text downloads 649

(2009) Computer profiling for forensic purposes. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,664

(2005) Configuration and Implementation Issues for a Firewall System Running on a Mobile Handset. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 3,438

(2000) Applied batch cryptography. PhD thesis, Queensland University of Technology.
Number of full-text downloads 135

(2010) Delegation framework for federated systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 176

(2012) Cryptographic techniques for managing computational effort. PhD thesis, Queensland University of Technology.
Number of full-text downloads 425

Rodofile, Nicholas R. (2018) Generating attacks and labelling attack datasets for industrial control intrusion detection systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 640

(2010) Securing IEEE 802.11 wireless LANs. PhD thesis, Queensland University of Technology.
Number of full-text downloads 3,665

(2016) Data flow and access control policy models in wireless body area network for healthcare. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 392

(2012) Approaches to access control under uncertainty. PhD thesis, Queensland University of Technology.
Number of full-text downloads 753

(2007) Digital evidence : representation and assurance. PhD thesis, Queensland University of Technology.
Number of full-text downloads 7,996

(2007) Denial of service : prevention, modelling and detection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,407

(2006) The role of the notary in secure electronic commerce. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 5,820

(2012) Predicate encryption with various properties. PhD thesis, Queensland University of Technology.
Number of full-text downloads 319

(2010) Strengthening and formally verifying privacy in identity management systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 288

(2006) Developing security services for network architectures. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,841

(2009) Protocol engineering for protection against denial-of-service attacks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,282

(2007) Digital image watermarking methods for copyright protection and authentication. PhD thesis, Queensland University of Technology.
Number of full-text downloads 8,648

(2010) Analysis of linear relationships in block ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,674

Thesis

(2003) Some practical issues in the design and analysis of computer experiments. PhD thesis, Victoria University, Melbourne.
Number of full-text downloads 195

(2006) Detecting and resolving redundancies in EP3P policies. Masters by Research thesis, Faculty of Computer Science and Software Engineering, University of Wollongong.
Number of full-text downloads 163

Working Paper

, , , & de Vel, Olivier (2001) Identifying the authors of suspect email. [Working Paper] (Unpublished)
Number of full-text downloads 1,497

Hodgett, Matthew (2013) Visualising security incidents through event aggregation. [Working Paper] (Unpublished)

Other Contribution

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, Wang, Hua, , , , & (2012) Detecting anomalous user activity.
Number of full-text downloads 64

Ranasinghe, Don Kushlani Ranmal (2017) Design optimization of time and structure dependent variables. (Unpublished)
Number of full-text downloads 18

& Green, Jonathan (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force (IETF).
Number of full-text downloads 68

This list was generated on Sun Aug 4 11:46:18 2024 AEST.