Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080499 Data Format not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 37.

Article

Ma, Xiaogang, Asch, Kristine, Laxton, John L., Richard, Stephen M., Asato, Carlos G., Carranza, Emmanuel John M., van der Meer, Freek D., Wu, Chonglong, Duclaux, Guillaume, and Wakita, Koji (2011) Data exchange facilitated. Nature Geoscience, 4. p. 814.

Januchowski, S.R., Pressey, R.L., VanDerWal, J., and Edwards, A. (2010) Characterizing errors in digital elevation models and estimating the financial costs of accuracy. International Journal of Geographical Information Science, 24 (9). pp. 1327-1347.

McCabe, Alan, Trevathan, Jarrod, and Read, Wayne (2008) Neural network-based handwritten signature verification. Journal of Computers, 3 (8). pp. 9-22.

Trevathan, Jarrod, and Read, Wayne (2007) Investigating shill bidding behaviour involving colluding bidders. Journal of Computers, 2 (10). pp. 63-75.

McCabe, A., and Trevathan, J. (2007) A new approach to avoiding the local extrema trap. ANZIAM Journal, 48. pp. 474-493.

Trevathan, Jarrod (2007) Are you the victim of online auction fraud? Australasian Science, 5. pp. 23-25.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Foley, William J., McIlwee, Allen, Lawler, Ivan, Aragones, Lem, Woolnough, Andrew P., and Berding, Nils (1998) Ecological applications of near infrared reflectance spectroscopy - a tool for rapid, cost-effective prediction of the composition of plant and animal tissues and aspects of animal performance. Oecologia, 116 (3). pp. 293-305.

Gorman, Rachel M. (1996) Demographic trends in Licuala ramsayi (F. Muell.) Domin (Arecaceae), Tam O'Shanter State Forest, Mission Beach, North Queensland. Mooreana, 6 (3). pp. 63-78.

Claussen, J.W. (1996) Acclimation abilities of three tropical rainforest seedlings to an increase in light intensity. Forest Ecology and Management, 80 (1-3). pp. 245-255.

Claussen, Jeff W., and Maycock, Colin R. (1995) Stem allometry in a North Queensland tropical rainforest. Biotropica, 27 (4). pp. 421-426.

Book Chapter

Trevathan, Jarrod, and Read, Wayne (2009) Detecting shill bidding in online English auctions. In: Gupta, Manish, and Sharman, Raj, (eds.) Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, Hershey, PA, USA, pp. 446-470.

Trevathan, Jarrod , McCabe, Alan, and Read, Wayne (2008) Bidding agents that perpetrate auction fraud. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunications Networks: communications in computer and information science. Communications in Computer and Information Science, 23 . Springer , Berlin, Germany, pp. 57-71.

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

Trevathan, Jarrod, and Read, Wayne (2008) Secure online English auctions. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunication Networks: third international conference, ICETE 2006, Setubal, Portugal, August 2006, selected papers. Communications in Computer and Information Science, 9 . Springer , New York, USA, pp. 113-133.

Conference Item

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443), pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

McCabe, Alan, and Trevathan, Jarrod (2008) Artificial Intelligence in sports prediction. In: Proceedings of the 5th International Conference on Information Technology, pp. 1194-1197. From: 5th International Conference on Information Technology: New Generations, 7-9 April 2008, Las Vegas, USA.

Trevathan, Jarrod, and Read, Wayne (2008) Cryptographic online auction schemes. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 193-203. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

McCabe, Alan, and Trevathan, Jarrod (2008) Markov model-based handwritten signature verification. In: Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (2), pp. 173-179. From: 5th International Conference on Embedded and Ubiquitous Computing, 17-20 December 2008, Shanghai, China.

McCabe, Alan, and Trevathan, Jarrod (2008) Performance evaluation of handwritten signature verification techniques. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 151-160. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

Trevathan, Jarrod, and Read, Wayne (2007) Detecting collusive shill bidding. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 799-808. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

McCabe, Alan, and Trevathan, Jarrod (2007) Implementation and analysis of a handwritten signature verification technique. In: Proceedings of the Second International Conference on Security and Cryptography (3), pp. 48-58. From: Secrypt 2007 International Conference on Security and Cryptography, 28-31 July 2007, Barcelona, Spain.

Lui, Siu Man, and Qiu, Ling (2007) Individual privacy and organizational privacy in business analytics. In: Proceedings of the 40th Annual Hawaii International Conference 2007. From: Hawaii International Conference on System Sciences, 3-6 January 2007, Hawaii.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586), pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

McCabe, Alan, and Trevathan, Jarrod (2007) Pre-processing of on-line signals in noisy environments. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 933-936. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, J., and Read, W. (2007) Privacy and security concerns for online share trading. In: Proceedings of the IASK International Conference: E-Activity and Leading Technologies, pp. 239-246. From: IASK International Conference: E-Activity and Leading Technologies 2007, 3-6 December 2007, Porto, Portugal.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Trevathan, Jarrod, and Read, Wayne (2007) A simple shill bidding agent. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 766-771. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, Jarrod, and Read, Wayne (2007) A software architecture for Continuous Double Auctions. In: Proceedings of IADIS International Conference: Applied Computing 2007, pp. 328-338. From: IADIS International Conference: Applied Computing 2007, 18-20 February 2007, Salamanca, Spain.

Trevathan, Jarrod, and McCabe, Alan (2005) Remote handwritten signature authentication. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 335-339. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-5 December 2013, Yogyakarta, Indonesia. (In Press)

Book

Trevathan, Jarrod, and Read, Wayne (2008) Shilled: fraud and security in online auctions. VDM Verlag Dr. Muller, Saarbrucken, Germany, pp. 1-168.

Thesis

Trevathan, Jarrod (2007) Privacy and security in online auctions. PhD thesis, James Cook University.

This list was generated on Thu Apr 24 01:35:47 2014 EST.