Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080499 Data Format not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: C | F | G | J | L | M | O | P | T
Number of items at this level: 37.

C

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Claussen, J.W. (1996) Acclimation abilities of three tropical rainforest seedlings to an increase in light intensity. Forest Ecology and Management, 80 (1-3). pp. 245-255.

Claussen, Jeff W., and Maycock, Colin R. (1995) Stem allometry in a North Queensland tropical rainforest. Biotropica, 27 (4). pp. 421-426.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-5 December 2013, Yogyakarta, Indonesia. (In Press)

F

Foley, William J., McIlwee, Allen, Lawler, Ivan, Aragones, Lem, Woolnough, Andrew P., and Berding, Nils (1998) Ecological applications of near infrared reflectance spectroscopy - a tool for rapid, cost-effective prediction of the composition of plant and animal tissues and aspects of animal performance. Oecologia, 116 (3). pp. 293-305.

G

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443), pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Gorman, Rachel M. (1996) Demographic trends in Licuala ramsayi (F. Muell.) Domin (Arecaceae), Tam O'Shanter State Forest, Mission Beach, North Queensland. Mooreana, 6 (3). pp. 63-78.

J

Januchowski, S.R., Pressey, R.L., VanDerWal, J., and Edwards, A. (2010) Characterizing errors in digital elevation models and estimating the financial costs of accuracy. International Journal of Geographical Information Science, 24 (9). pp. 1327-1347.

L

Lui, Siu Man, and Qiu, Ling (2007) Individual privacy and organizational privacy in business analytics. In: Proceedings of the 40th Annual Hawaii International Conference 2007. From: Hawaii International Conference on System Sciences, 3-6 January 2007, Hawaii.

M

Ma, Xiaogang, Asch, Kristine, Laxton, John L., Richard, Stephen M., Asato, Carlos G., Carranza, Emmanuel John M., van der Meer, Freek D., Wu, Chonglong, Duclaux, Guillaume, and Wakita, Koji (2011) Data exchange facilitated. Nature Geoscience, 4. p. 814.

McCabe, Alan, Trevathan, Jarrod, and Read, Wayne (2008) Neural network-based handwritten signature verification. Journal of Computers, 3 (8). pp. 9-22.

McCabe, Alan, and Trevathan, Jarrod (2008) Artificial Intelligence in sports prediction. In: Proceedings of the 5th International Conference on Information Technology, pp. 1194-1197. From: 5th International Conference on Information Technology: New Generations, 7-9 April 2008, Las Vegas, USA.

McCabe, Alan, and Trevathan, Jarrod (2008) Markov model-based handwritten signature verification. In: Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (2), pp. 173-179. From: 5th International Conference on Embedded and Ubiquitous Computing, 17-20 December 2008, Shanghai, China.

McCabe, Alan, and Trevathan, Jarrod (2008) Performance evaluation of handwritten signature verification techniques. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 151-160. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

McCabe, A., and Trevathan, J. (2007) A new approach to avoiding the local extrema trap. ANZIAM Journal, 48. pp. 474-493.

McCabe, Alan, and Trevathan, Jarrod (2007) Implementation and analysis of a handwritten signature verification technique. In: Proceedings of the Second International Conference on Security and Cryptography (3), pp. 48-58. From: Secrypt 2007 International Conference on Security and Cryptography, 28-31 July 2007, Barcelona, Spain.

McCabe, Alan, and Trevathan, Jarrod (2007) Pre-processing of on-line signals in noisy environments. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 933-936. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

O

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

P

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586), pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

T

Trevathan, Jarrod, and Read, Wayne (2009) Detecting shill bidding in online English auctions. In: Gupta, Manish, and Sharman, Raj, (eds.) Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, Hershey, PA, USA, pp. 446-470.

Trevathan, Jarrod , McCabe, Alan, and Read, Wayne (2008) Bidding agents that perpetrate auction fraud. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunications Networks: communications in computer and information science. Communications in Computer and Information Science, 23 . Springer , Berlin, Germany, pp. 57-71.

Trevathan, Jarrod, and Read, Wayne (2008) Cryptographic online auction schemes. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 193-203. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

Trevathan, Jarrod, and Read, Wayne (2008) Secure online English auctions. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunication Networks: third international conference, ICETE 2006, Setubal, Portugal, August 2006, selected papers. Communications in Computer and Information Science, 9 . Springer , New York, USA, pp. 113-133.

Trevathan, Jarrod, and Read, Wayne (2008) Shilled: fraud and security in online auctions. VDM Verlag Dr. Muller, Saarbrucken, Germany, pp. 1-168.

Trevathan, Jarrod, and Read, Wayne (2007) Investigating shill bidding behaviour involving colluding bidders. Journal of Computers, 2 (10). pp. 63-75.

Trevathan, Jarrod (2007) Are you the victim of online auction fraud? Australasian Science, 5. pp. 23-25.

Trevathan, Jarrod (2007) Privacy and security in online auctions. PhD thesis, James Cook University.

Trevathan, Jarrod, and Read, Wayne (2007) Detecting collusive shill bidding. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 799-808. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, J., and Read, W. (2007) Privacy and security concerns for online share trading. In: Proceedings of the IASK International Conference: E-Activity and Leading Technologies, pp. 239-246. From: IASK International Conference: E-Activity and Leading Technologies 2007, 3-6 December 2007, Porto, Portugal.

Trevathan, Jarrod, and Read, Wayne (2007) A simple shill bidding agent. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 766-771. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, Jarrod, and Read, Wayne (2007) A software architecture for Continuous Double Auctions. In: Proceedings of IADIS International Conference: Applied Computing 2007, pp. 328-338. From: IADIS International Conference: Applied Computing 2007, 18-20 February 2007, Salamanca, Spain.

Trevathan, Jarrod, and McCabe, Alan (2005) Remote handwritten signature authentication. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 335-339. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

This list was generated on Wed Apr 16 14:26:11 2014 EST.