List of Subject Classifications Records

Browse Results (33 results found)

Subscribe to the RSS feed for this result setSubscribe to the RSS feed for this result set

 Browse by Research Fields, Courses and Disciplines The Research Fields, Courses and Disciplines (Australian Standard Research Classification) is published by the Australian Bureau of Statistics (ABS catalogue number 1297.0) 1998. ABS data is used with permission from the Australian Bureau of Statistics -> 280000 Information, Computing and Communication Sciences -> 280500 Data Format -> 280505 Data Security :

No further child subject classifications could be found.
  Abstract Views File Downloads Thomson Reuters Web of Science Citation Count Scopus Citation Count Altmetric Score
McComb, T. and Wildman, L. (2007). A combined approach for information flow analysis in fault tolerant hardware. In: J. S. Dong and J. Sun, Engineering Complex Computer Systems 2007. 12th IEEE International Conference on Engineering Complex Computer Systems 2007 (ICECCS 2007), Auckland, New Zealand, (117-128). 11-14 July 2007. doi:10.1109/ICECCS.2007.5 103   0 Cited 0 times in Scopus0 0
Donovan, D M, Lefevre, J G and Simpson, L (2006). A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In: R Balakrishnan and C E Veni Madhavan, Proceedings of International Conference on Discrete Mathematics (ICDM 2006). International Conference on Discrete Mathematics 2006 (ICDM 2006), Banglaore, India, (75-87). 15-18 December 2006. 66  
Machanick, P. (2005) A distributed systems approach to secure Internet mail. Computers & Security, 24 6: 492-499. doi:10.1016/j.cose.2005.03.007 59   0 Cited 1 times in Scopus1 0
Liu, Zeng, Li, Xue and Dong, Zhaoyang (2004). A lightweight encryption algorithm for mobile online multimedia devices. In: Xiaofang Zhou, Stanley Su, Mike P. Papazoglou, Maria E. Orlowska and Keith G. Jeffery, Web Information Systems - WISE 2004: Proceedings of the 5th International Conference on Web Information Systems Engineering. The Fifth International Conference on Web Information Systems Engineering (WISE 2004), Brisbane, Australia, (653-658). 22-24 November 2004. 220   1
Orgun, M. A., Ma, J., Liu, C. and Governatori, G. (2006). Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. In: Y. Dai, M. Hinkey and Y.Pan, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06). 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indiana University, Purdue University, Indianapolis, (325-332). 29 September 29 - 1 October, 2006. doi:10.1109/DASC.2006.19 181 416 0 Cited 3 times in Scopus3 0
Governatori, Guido and Maher, Michael J. (2000). An Argumentation-Theoretic Characterization of Defeasible Logic. In: Horn, Werner, 14th European Conference on Artificial Intelligence, , (469-474). . 177 671
Yesberg, John and Henderson, Marie (2001). Applications of trusted review to information security. In: Vijay Varadharajan, and Yi Mu, Lecture Notes in Computer Science. Information Security and Privacy. 6th Australasian Conference, ACISP 2001, Sydney, New South Wales, (305-319). 11-13 July, 2001. 16  
Liu, Zheng, Li, Xue and Dong, Zhaoyang (2004). A sensor-based multimedia authentication system. In: W. Grosky and L. Chen, Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, ICME 2004. The 2004 IEEE International Conference on Multimedia and Expo (ICME 2004), Taipei, Taiwan, (943-946). 27-30 June 2004. doi:10.1109/ICME.2004.1394357 70   0 0
Clutterbuck, P. J. and O'Brien, P. F. (2006). A software audit framework for spyware risk mitigation. In: S. Chatterjee and R. Alan Hevner, Proceedings of the 1st International Conference on Design Science Research in Information Systems and Technology. International Conference on Design Science Research in Information Systems and Technology (1st, 2006), Claremont, CA, U.S.A., (461-474). 24-25 February 2006. 105  
Fidge, C. J. (2001) A survey of verification techniques for security protocols Brisbane: Software Verification Research Cen. Univ of Qld 42  
Fidge, Colin (2001) A Survey of Verification Techniques for Security Protocols. Technical Report 01-22, Software Verification Research Centre, School of Information Technology, The University of Queensland. 577 773
Cockcroft, S.K.S. and Clutterbuck, P. J. (2001). Attitudes towards information privacy. In: G. Finnie, D. Cecez-Kecmanovic and B. Lo, Proceedings of the Twelfth Australasian Conference on Information Systems. Australasian Conference on Information Systems, Coffs Harbour, (). 4-7 December, 2001. 88  
Wishart, Ryan, Henricksen, Karen and Indulska, Jadwiga (2005). Context obfuscation for privacy via ontological descriptions. In: T. Strang and C. Linnhoff-Popien, 'Location and Context-Awareness' Proceedings. First International Workshop on Location and Context-Awareness (LoCA 2005), Oberpfaffenhofen, Germany, (276-288). 12-13 May, 2005. doi:10.1007/11426646_26 81 2 9 Cited 12 times in Scopus12 0
Long, B.W., Fidge, C.J. and Carrington, D. (2007). Cross-layer verification of type flaw attacks on security protocols. In: Dobbie, G., Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC-2007). Australasian Computer Science Conference (ACSC-2007), Ballarat, Victoria, Australia, (171-180). 30 January - 2 February, 2007. 49   Cited 0 times in Scopus0
Liu, Z., Li, X. and Dong, Z. Y. (2004). Enhancing security of frequency domain video encryption. In: Proceedings of the Twelfth ACM International Conference on Multimedia. The Twelfth ACM International Conference on Multimedia, New York, (304-307). 10-16 October, 2004. 65  
Connelly, Simon, Burmeister, Jay, MacDonald, Anthony and Hussey, Andrew (2001) Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces. Technical Report no. 01-01, Software Verification Research Centre, School of Information Technology, The University Of Queensland. 372 567
Henricksen, Karen, Wishart, Ryan, McFadden, Ted and Indulska, Jadwiga (2005). Extending context models for privacy in pervasive computer environments. In: S. Kawada, Proceedings of the 3rd Conference on Pervasive Computing and Communication Workshops. Workshop on Context Modeling and Reasoning (CoMoRea'05). The 3rd Conference on Pervasive Computing and Communication Workshops. Workshop on Context Modeling and Reasoning (CoMoRea'05), Hawaii, (20-24). 12 March 2005. doi:10.1109/PERCOMW.2005.36 63   2 Cited 13 times in Scopus13 0
Robinson, Neil, Lindsay, Peter and Pitman, Adrian (2000) Extending the Integrated Capability Maturity Model (CMMI) for Safety-related Applications. Technical Report no. 00-40, Software Verification Research Centre, School of Information Technology, The University of Queensland. 1238 598
Cockcroft, S. (2002) Gaps between policy and practice in the protection of data privacy. Journal of Information Technology Theory and Applications, 4 3: 1-13. 119  
Hussey, Andrew and Atchison, Brenton (2000) Hazard Analysis of Interactive Systems. Technical Report no. 00-18, Software Verification Research Centre, School of Information Technology, The University of Queensland. 398 889
Natwichai, Juggapong, Li, Xue and Orlowska, Maria E. (2005). Hiding Classification Rules for Data Sharing with Privacy Preservation. In: Tjoa, A. Min and Trujillo, Juan, Data Warehousing and Knowledge Discovery, 7th International Conference, DaWak 2005. 7th International Conference on Data Warehousing and Knowledge Discovery, Copenhagen, Denmark, (468-477). 22-26 August, 2005. 199 580 1 Cited 3 times in Scopus3
Natwichai, J., Orlowska, M. and Sun, X. (2007). Hiding sensitive associative classification rule by data reduction. In: Alhajj, R., Gao, H., Li, X, Li, J. and Zaïane, O.R., Advanced Data Mining and Applications. Third International Conference on Advanced Data Mining and Applications (ADMA 2007), Harbin, China, (310-322). 6-8 August, 2007. 90 1 1
Cockcroft, S. K. S. (2006) Information privacy: Culture, legislation and user attitudes. Australasian Journal of Information Systems, 14 1: 55-68. 84  
Liu, Zheng and Li, Xue (2004). Motion vector encryption in multimedia streaming. In: Y. CHen, Proceedings of the Tenth International Conference on Multimedia Modelling. The Tenth International Conference on Multimedia Modelling, Brisbane, Australia, (64-71). 5-7 January 2004. doi:10.1109/MULMM.2004.1264968 80   0
Liu, Z., Li, X. and Dong, Z. Y. (2004). Multimedia authentication with sensor-based watermarking. In: J. Dittmann, Proceedings of the Multimedia and Security Workshop 2004. The Multimedia and Security Workshop 2004, Magdeburg, Germany, (155-159). 20-21 September, 2004. 50  
Amirbekyan, Artak and Estivill-Castro, Vladimir (2009) Practical protocol for Yao’s millionaires problem enables secure multi-party computation of metrics and efficient privacy-preserving k-NN for large data sets. Knowledge and Information Systems, 21 3: 327-363. doi:10.1007/s10115-009-0233-z 111   4 Cited 5 times in Scopus5 0
Cerone, Antonio (2001) Representing ASN.1 in Z. Technical Report 01-14, Software Verification Research Centre, School of Information Technology, The University of Queensland. 479 472
Hussey, Andrew and Atchison, Brenton (2000) Safe Architectural Design Principles. Technical Report no. 00-19, Software Verification Research Centre, School of Information Technology, The University of Queensland. 882 1596
Lindsay, P. and Smith, G. (2000) Safety Assurance of Commercial-Off-The-Shelf Software. Technical Report no. 00-17, Software Verification Research Centre, School of Information Technology, The University of Queensland. 699 526
Pozzobon, O. (2004). Secure location services: Vulnerability analysis and provision of security in location systems Master's Thesis, School of Information Technology and Electrical Engineering, The University of Queensland. 110  
Sophie Cockcroft (2002) Securing the commercial internet: Lessons learned in developing a postgraduate course in information security management. Journal of Information Systems Education, 13 3: 205-210. 65  
McComb, T. J. and Wildman, L. P. (2005). SIFA: A tool for evaluation of high-grade security devices. In: C. Boyd and J. M. Gonzalez Nieto, Proceedings of the 10th Australasian Conference on Information Security and Privacy. Australasian Conference on Information Security and Privacy 2005 (ACISP 2005), Brisbane, Australia, (230-241). 4-6 July, 2005. doi:10.1007/b137750 65   6 Cited 8 times in Scopus8 0
Wishart, R.G., Robinson, R. R., Indulska, J. and Josang, A. (2005). SuperstringRep: Reputation-enhanced service discovery. In: V. Estibill-Castro, Proceedings of the Twenty-Eighth Australasian Computer Science Conferene (ACSC2005). Twenty-Eighth Australasian Computer Science Conferene (ACSC2), Newcastle, Australia, (49-57). 31 January - 3 Feburary, 2005. 53 1