|Up a level|
Long, Hang and Xiang, Wei and Zhang, Xiaoli and Wang, Jing and Wang, Wenbo (2014) Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node. In: 31st URSI General Assembly and Scientific Symposium (URSI GASS 2014), 16-23 Aug 2014, Beijing, China.
Zhang, Ji and Liu, Xuemei and Luo, Yonglong (2013) An efficient and robust privacy protection technique for massive streaming choice-based information. In: 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013), 27 Oct-1 Nov 2013, San Francisco, CA. United States.
Han, Weili and Cao, Ye and Bertino, Elisa and Yong, Jianming (2012) Using automated individual white list to protect web digital identities. Expert Systems with Applications, 39 (15). pp. 11861-11869. ISSN 0957-4174
Kabir, Md Enamul and Wang, Hua (2012) Microdata protection method through microaggregation: a systematic approach. Journal of Software, 7 (11). pp. 2415-2422. ISSN 1796-217X
Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2012) A role-involved purpose-based access control model. Information Systems Frontiers, 14 (3). pp. 809-822. ISSN 1387-3326
Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Ding, Xiaofeng and Wang, Hua (2012) Data privacy against composition attack. In: 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012), 15-18 Apr 2012, Busan, South Korea.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Pei, Jian (2011) Publishing anonymous survey rating data. Data Mining and Knowledge Discovery , 23 (3). pp. 379-406. ISSN 1384-5810
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048
Yong, Jianming and Tiwari, Sanjib and Huang, Xiaodi and Jin, Qun (2011) Constructing robust digital identity infrastructure for future networked society. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.
Sun, Xiaoxun and Li, Min and Wang, Hua (2011) A family of enhanced (L,alpha) diversity models for privacy preserving data publishing. Future Generation Computer Systems: The International Journal of Grid Computing: Theory, Methods and Applications, 27 (3). pp. 348-356. ISSN 0167-739X
Kabir, Md Enamul and Wang, Hua (2011) Microdata protection method through microaggregation: a median-based approach. Information Security Journal: A Global Perspective, 20 (1). pp. 1-8. ISSN 1939-3555
Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional role-involved purpose-based access control model. Journal of Organizational Computing and Electronic Commerce, 21 (1). pp. 71-91. ISSN 1091-9392
Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Wang, Hua (2011) Cloning for privacy protection in multiple independent data publications. In: CIKM 2011: 20th ACM Conference on Information and Knowledge Management , 24-28 Oct 2011, Glasgow, United Kingdom.
Sileh, Ibrahim Khalil and Alajel, Khalid Mohamed and Xiang, Wei (2011) Cooperative relay selection based UEP scheme for 3D video transmission over Rayleigh fading channel. In: 2011 International Conference on Digital Image Computing: Techniques and Application (DICTA 2011), 6-8 Dec 2011, Noosa, Australia .
Sun, Lili and Wang, Hua and Tao, Xiaohui and Zhang, Yanchun and Yang, Jing (2011) Privacy preserving access control policy and algorithms for conflicting problems. In: 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011) , 16-18 Nov 2011, Changsha, China.
Kabir, Md Enamul and Wang, Hua and Zhang, Yanchun (2010) A pairwise systematic microaggregation for statistical disclosure control. In: 10th IEEE International Conference on Data Mining (ICDM 2010) , 14-17 Dec 2010, Sydney, Australia.
Sun, Xiaoxun and Wang, Hua (2010) Towards identify anonymization in large survey rating data. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.
Kabir, Md Enamul and Wang, Hua and Bertino, Elisa and Chi, Yunxiang (2010) Systematic clustering method for l-diversity model. In: ADC 2010: 21st Australasian Conference on Database Technologies, 18-22 Jan 2010, Brisbane, Australia.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2010) Satisfying privacy requirements: one step before anonymization. In: PAKDD 2010: 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining , 21-24 Jun 2010, Hyderabad, India.
Kabir, Md Enamul and Wang, Hua (2010) Systematic clustering-based microaggregation for statistical disclosure control. In: NSS 2010: International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Truta, Traian Marius (2008) Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Transactions on Data Privacy, 1 (2). pp. 53-66. ISSN 1888-5063
Lai, David and Zhang, Zhongwei (2008) Self-authentication of encrypted channels in service network graph. In: IFIP International Conference on Network and Parallel Computing (NPC 2008) , 18-21 Oct 2008, Shanghai, China.
Yong, Jianming and Bertino, Elisa (2007) Replacing lost or stolen e-passports. Computer (IEEE), 40 (10). pp. 89-91. ISSN 0018-9162
Wang, Zhen and Zhang, Zhongwei and Zhang, Yanchun (2006) Towards enhancing trust on Chinese e-commerce. In: APWeb 2006: 8th Asia-Pacific Web Conference: Frontiers of WWW Research and Development, 16-18 Jan 2006, Harbin, China.
Quarisa, Matthew (2005) An inexpensive hardware-based identification system for improved computer security. [USQ Project] (Unpublished)
Ally, Mustafa and Toleman, Mark (2005) A framework for assessing payment security mechanisms and security information on e-commerce web sites. In: 9th Pacific Asia Conference on Information Systems (PACIS 2005), 7-10 July 2005, Bangkok, Thailand.
Loh, Shiau Ping (2004) Watermarking for securing digital media content. [USQ Project] (Unpublished)
Ally, Mustafa and Toleman, Mark (2004) A critical analysis of buyer authenticated credit card payment programs: the online merchant's perspective. In: e-Biz World Conference 2004, 25 Feb 2004, Seoul, Korea.
Ally, Mustafa and Toleman, Mark (2004) Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective. In: IEEE International Conference on E-Commerce Technology 2004, 6-9 Jul 2004, San Diego.
Yong, Jianming and Lane, Michael S. and Toleman, Mark and Yang, Yun (2003) Enforcing secure access control in integrated systems over the internet. In: 1st Australian Information Security Management Conference, 24 Nov 2003, Perth, Western Australia.
Wang, Hua and Zhang, Yanchun and Cao, Jinli and Varadharajan, Vijay (2003) Achieving secure and flexible M-services through tickets. Systems, Man, and Cybernetics. Part A, 33 (6). pp. 697-708. ISSN 1083-4427
Ally, Mustafa and Toleman, Mark (2003) Acts of faith. Australian CPA, 73 (10). pp. 60-61.