Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0806 Information Systems > 080610 Information Systems Organisation"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 12.

Article

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Ghodosi, Hossein, and Pieprzyk, Josef (2001) Democratic systems. Lecture notes in computer science, 2119. pp. 392-402.

Ghodosi, Hossein, and Saeednia, Shahrokh (2001) Modification to self-certified group-oriented cryptosystem without combiner. Electronics Letters, 37 (2). pp. 86-87.

Ghodosi, Hossein, and Pieprzyk, Josef (2000) Cheating prevention in secret sharing. Lecture notes in computer science, 1841. pp. 328-341.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1998) Secret sharing in multilevel and compartmented groups. Lecture notes in computer science, 1438. pp. 367-378.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1997) Remarks on the multiple assignment secret sharing scheme. Lecture notes in computer science, 1334. pp. 72-80.

Conference Item

Nazir, Mohamed, and Lui, Carrie Sui Man (2015) Classifying real money trading in virtual world. In: Proceedings of the Fifteenth International Conference on Electronic Business. pp. 149-159. From: ICEB 2015: Fifteenth International Conference on Electronic Business: internet of things, 6-10 December 2015, Hong Kong, China.

Tee, Sing What, Bowen, Paul L, Rohde, Fiona H, and Doyle, Peta (2005) An empirical investigation of factors influencing organisations to improve data quality in their information systems. In: UNSPECIFIED. From: First Asia-Pacific Symposium on Accounting Information Systems, 2 July 2005, Melbourne, Australia.

A'Herran, Anne (2003) Extent and nature of portalling in Australian university websites. In: Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE). pp. 17-25. From: ASCILITE 2003: Interact, integrate, impact, 7-10 December 2003, Adelaide, SA, Australia.

Al-Ibrahim, Mohamed, Ghodosi, Hossein, and Pieprzyk, Josef (2002) Authentication of concast communication. In: Procress in Cryptology: INDOCRYPT 2002. pp. 185-198. From: 3rd International Conference on Cryptology, 16-18 December, 2002, Hyderabad, India.

Thesis

Hardy, Dianna Lynn (2008) Searching heterogeneous and distributed databases: a case study from the maritime archaeology community. Masters (Research) thesis, James Cook University.

Lissonnet, Sophie (2004) (Re)collections: developing a metadata application profile for the Quinkan Culture Matchbox. Masters (Research) thesis, James Cook University.

This list was generated on Thu Mar 28 22:45:34 2024 AEST.