Items for Unique Author :

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors Name | Item Type
Jump to: A | D | K | L | Q | S | X
Number of items at this level: 15.

A

Ally, Mustafa and Toleman, Mark (2003) Acts of faith. Australian CPA, 73 (10). pp. 60-61.

Ally, Mustafa and Toleman, Mark (2002) Meeting consumer trust concerns at the checkouts of Australian online retailers. In: ACIS 2002: 13th Australasian Conference on Information Systems, 4-6 Dec 2002, Melbourne, Australia.

Ally, Mustafa and Toleman, Mark (2004) Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective. In: IEEE International Conference on E-Commerce Technology 2004, 6-9 Jul 2004, San Diego.

Ally, Mustafa and Toleman, Mark (2005) A framework for assessing payment security mechanisms and security information on e-commerce web sites. In: 9th Pacific Asia Conference on Information Systems (PACIS 2005), 7-10 July 2005, Bangkok, Thailand.

D

Darragh, Warren J. (2009) An analysis of information security in selected Australian organisations. [Thesis (PhD/Research)] (Unpublished)

K

Kabir, Md Enamul and Wang, Hua (2009) Conditional purpose based access control model for privacy protection. In: ADC 2009: 20th Australasian Conference on Australasian Database, 20-23 Jan 2009, Wellington, New Zealand.

L

Li, Min and Wang, Hua (2008) Protecting information sharing in distributed collaborative environment. In: APWeb 2008: 10th Asia Pacific Web Conference Workshop , 26-28 Apr 2008, Shenyang, China.

Li, Min and Wang, Hua and Plank, Ashley (2009) Privacy-aware access control with generalization boundaries. In: 32nd Australasian Computer Science Conference (ACSC 2009), 19-23 Jan 2009, Wellington, New Zealand.

Loh, Shiau Ping (2004) Watermarking for securing digital media content. [USQ Project] (Unpublished)

Q

Quarisa, Matthew (2005) An inexpensive hardware-based identification system for improved computer security. [USQ Project] (Unpublished)

S

Sun, Xiaoxun and Li, Min and Wang, Hua and Plank, Ashley (2008) An efficient hash-based algorithm for minimal k-anonymity. In: ACSC 2008: 31st Australasian Computer Science Conference, 22-25 Jan 2008, Wollongong, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Microdata protection through approximate microaggregation. In: ACSC 2009: 32nd Australasian Computer Science Conference, 19-23 Jan 2009, Wellington, New Zealand.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) On the complexity of restricted k-anonymity problem. In: APWeb 2008: 10th Asia-Pacific Web Conference, 26-28 Apr 2008, Shenyang, China.

Sun, Xiaoxun and Wang, Hua and Truta, Traian Marius and Li, Jiuyong and Li, Ping (2008) (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

X

Xiang, Wei and Desai, Bhavin and Wen, Peng and Wang, Yafeng and Peng, Tianshu (2009) A prototype biometric security authentication system based upon fingerprint recognition. In: RSKT 2009: 4th International Conference on Rough Set and Knowledge Technology , 14-16 Jul 2009, Gold Coast, Australia.

This list was generated on Thu Apr 17 23:37:25 2014 EST.