A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC).
Proceedings of the Seventh Australasian Information Security Conference, 2009
A Sustainable Approach to Security and Privacy in Health Information Systems.
Proceedings of the Australasian Conference on Information Systems, 2007
A Model for Improving e-Security in Australian Universities.
J. Theor. Appl. Electron. Commer. Res., 2006
Information Protection Management Structures in Australian E-courts.
J. Theor. Appl. Electron. Commer. Res., 2006
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Strengthening the Key Schedule of the AES.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
An Implementation of Bitsliced DES on the Pentium MMX<sup>TM</sup> Processor.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000