If you made any changes in Pure these will be visible here soon.

Research Output 1997 2017

Filter
Conference Paper
2017

A formal model for an ideal CFI

Minagar, S., Srinivasan, B. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 707-726 20 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enforcing security in artificially intelligent robots using monitors (short paper)

Creado, O. M. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 648-659 12 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Securing smart cities with monitors

Creado, O. M. & Le, P. D., 1 Jan 2017, Proceedings of the 30th International Business Information Management Association Conference (IBIMA): 8-9 November 2017 Madrid Spain. Soliman, K. S. (ed.). King of Prussia PA USA: International Business Information Management Association (IBIMA), p. 3972-3991 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2016

A dynamic security model for addressing hacking risk factors

Alsunbul, S. A., Le, P. D., Newmarch, J. & Tan, J., 2016, Proceedings of the 25th International Conference on Information Systems Development, ISD 2016: August 24-26, 2016, Katowice, Poland. Gołuchowski, J. & Pańkowska, M. (eds.). Association for Information Systems, p. 586-594 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A network defense system for detecting and preventing potential hacking attempts

Alsunbul, S., Le, P., Tan, J. & Srinivasan, B., 7 Mar 2016, 2016 International Conference on Information Networking (ICOIN 2016): 13-15 January 2016, Kota Kinabalu, Malaysia [proceedings]. Lee, H. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 449-454 6 p. 7427157

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2015

A hybrid mobile authentication model for ubiquitous networking

Almuhaideb, A., Srinivasan, B., Le, P. D., Alhabeeb, M. & Alfehaid, W. M., 2015, 2015 IEEE Trustcom/BigDataSE/ISPA. Yan, Z. & Mueller, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 360 - 367 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An active defence system for securing network infrastructures against hacking

Alsunbul, S., Le, P. D., Tan, J. & Srinivasan, B., 2015, Proceedings of The 26th International Business Information Management Association Conference (IBIMA). Soliman, K. S. (ed.). Norristown PA USA: International Business Information Management Association, p. 634 - 647 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An evolving trust paradigm for enforcing computing system security

Creado, O. M., Le, P. D., Newmarch, J. & Tan, J., 2015, 2015 IEEE Congress on Evolutionary Computation (CEC 2015). Murata, T. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2595 - 2602 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A structuring concept for securing modern day computing systems

Creado, O. M., Le, P. D., Newmarch, J. & Tan, J., 2015, 2015 International Conference on Computational Science (ICCS2015). Koziel, S., Leifsson, L., Lees, M., Krzhizhanovskaya, V. V., Dongarra, J. & Sloot, P. M. A. (eds.). Amsterdam Netherlands: Elsevier, Vol. 51. p. 2744 - 2748 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File
2012

Analysis of mobile authentication protocols by SVO logic

Almuhaideb, A., Srinivasan, B., Le, P. D., Wilson, C. & Malhotra, V. M., 2012, Proceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012: August 17-19, 2012, Amrita University, Amritapuri Campus, Kerala, India. New York, New York: Association for Computing Machinery (ACM), p. 126-134 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2011

Evaluating the functionality of the token filtering technique in filtering denial of service packets using a new formal evaluation model

Alhabeeb, M., Le, P. D. & Srinivasan, B., 2011, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications. Rho, S., Chen, J. & Wang, C-L. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 318 - 323 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Formal verification of a secure mobile banking protocol

Ngo, H. H. H., Dandash, O., Le, P. D., Srinivasan, B. & Wilson, C. C., 2011, Proceedings of the First International Conference on Computer Science and Information Technology, Part II. Meghanathan, N., Kaushik, B. K. & Nagamalai, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 410 - 421 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preventing denial of service attacks in government e-services using a new efficient packet filtering technique

Alhabeeb, M., Le, P. D. & Srinivasan, B., 2011, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications. Rho, S., Chen, J. & Wang, C-L. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 262 - 269 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Two-party mobile authentication protocols for wireless roaming networks

Almuhaideb, A., Le, P. & Srinivasan, B., 2011, Proceedings of the 2011 IEEE International Symposium on Network Computing and Applications. Olsen, R. L. (ed.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 285 - 288 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

A framework to measure the effectiveness of image representations

Le, M. V., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 2010 International Conference on Image Processing, Computer Vision and Pattern Recognition. Arabnia, H. R. & Deligiannidis, L. (eds.). USA: CSREA Press, p. 41 - 46 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An authentication model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 996-1003 8 p. 5474818

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Beyond fixed key size: Classifications toward a balance between security and performance

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1047 - 1053 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Holistic approach for critical system security: Flooding prevention

Alhabeeb, M., Wu, X., Almuhaideb, A., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 6th International Conference on Networked Computing. Yuan, C., Tsay, L-S., Wang, F-Y., Ko, F., Zhan, J., Na, Y., Choi, E., Jo, Y., Gomes, A., Shi, J. Y., Lin, H. Y. & Sohn, Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 196 - 203 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Information security threats classification pyramid

Alhabeeb, M., Almuhaideb, A., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 208 - 213 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Passport-Visa based authentication mechanism for ubiquitous mobile communication

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 6th International Conference on Networked Computing. Yuan, C., Tsay, L-S., Wang, F-Y., Ko, F., Zhan, J., Na, Y., Choi, E., Jo, Y., Gomes, A., Shi, J. Y., Lin, H. Y. & Sohn, Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 204 - 209 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009

A membership oriented group key management for application services

Ngo, H. H. H., Wang, Y., Le, P. D., Srinivasan, B. & Malhotra, V. M., 2009, Proceedings of the 12th International Conference on Network-Based Information Systems. Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 240 - 245 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Multicasting key management in wireless networks

Wang, Y., Ngo, H. H. H., Le, P. D., Srinivasan, B. & Malhotra, V. M., 2009, Proceedings of the 12th International Conference on Network-Based Information Systems. Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 234 - 239 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Package-role based authorization control model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Wilson, C. C., 2009, Proceedings of the International Conference on Availability, Reliability and Security. Tjoa, A. M. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 475 - 480 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Probabilistic encryption - A comparative analysis against RSA and ECC

Creado, O. M., Wu, X., Wang, Y. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1123 - 1129 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Probabilistic encryption - A practical implementation

Creado, O. M., Wang, Y., Wu, X. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1130 - 1136 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

The design and implementation of a sensitive information system

Wang, X., Wu, X., Wang, Y. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1174 - 1179 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008

A group authentication model for wireless network services based on group key management

Ngo, H., Wu, X. & Le, P. D., 2008, Proceedings of the Tenth International Conference on Enterprise Information Systems. Cordeiro, J. & Filipe, J. (eds.). Setubul Portugal: Institute for Systems and Technologies of Information, Control and Communication (INSTICC), Vol. ISAS-2. p. 182 - 188 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A method for authentication services in wireless networks

Ngo, H., Wu, X., Le, P. D. & Wilson, C. C., 2008, Proceedings of the 14th Americas Conference on Information Systems. Parsons, J. & Yuan, Y. (eds.). Toronto ON Canada: Association for Information Systems, p. 1 - 9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A novel authentication protocol for sensitive information privacy protection using dynamic key based group key management

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology. Wang, P. P., Sohn, S., Dhillon, G., Lee, J., Ko, F. I. S., Nguyen, N. T., Bi, J., Sakurai, K., Ahmadi, M., Na, Y. J. & Chung, W-Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1113 - 1119 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A novel group key management scheme for privacy protection sensitive information systems

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Security & Management. Arabnia, H. R., Aissi, S. & Bedworth, M. (eds.). USA: CSREA Press, p. 93 - 99 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A study of wavelets-based image representations and their effectiveness

Le, M. V., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Image Processing, Computer Vision and Pattern Recognition. Arabnia, H. R. (ed.). Las Vegas NV USA: CSREA Press, Vol. II. p. 638 - 642 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Design & implementation of a secure sensitive information system for wireless mobile devices

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference. Dadej, A. & Harris, R. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 45 - 50 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Dynamic keys based sensitive information system

Wu, X., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 9th International Conference for Young Computer Scientists. Wang, G., Chen, J., Fellows, M. R. & Ma, H. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1895 - 1901 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient key management for secure wireless multicast

Wang, Y., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology. Wang, P. P., Sohn, S., Dhillon, G., Lee, J., Ko, F. I. S., Nguyen, N. T., Bi, J., Sakurai, K., Ahmadi, M., Na, Y. J. & Chung, W-Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2. p. 1131 - 1136 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007

A methodology for deriving objective image comparison metrics

Le, M. V., Le, P. D. & Srinivasan, B., 2007, Proceedings of the Ninth IASTED International Conference Signal and Image Processing. de Figueiredo, R. J. P. (ed.). Anaheim CA USA: ACTA Press, p. 89 - 94 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A new dynamic key generation scheme for fraudulent internet payment prevention

Dandash, O., Wang, Y., Le, P. D. & Srinivasan, B., 2007, Proceedings of the Fourth International Conference on Information Technology: New Generations. Latifi, S. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 83 - 88 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A new group key management structure for fraudulent internet banking payments detection

Dandash, O., Wang, Y., Le, P. D. & Srinivasan, B., 2007, Proceedings of Ninth International Conference on Enterprise Information Systems: Software Agents and Internet Computing. Cardoso, J., Cordeiro, J. & Filipe, J. (eds.). Portugal: Institute for Systems and Technologies of Information, Control and Communication, p. 57 - 62 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Hybrid group key management scheme for secure wireless multicast

Wang, Y., Le, P. D. & Srinivasan, B., 2007, Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Lee, R., Chowdhury, M. U., Ray, S. & Lee, T. (eds.). Los Alamitos CA USA: IEEE Computer Society, p. 346 - 351 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security analysis for internet banking models

Dandash, O., Le, P. D. & Srinivasan, B., 2007, Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Feng, W. & Gao, F. (eds.). Los Alamitos CA USA: IEEE Computer Society, p. 1141 - 1146 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2006

An efficient and secure code sharing for peer-to-peer communications

Wu, W. & Le, P. D., 2006, Proceedings of the Third International Conference on Information Technology: New Generations. Latifi, S. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 476 - 481 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient group key management in wireless networks

Wang, Y., Damodaran, D. & Le, P. D., 2006, Proceedings of the Third International Conference on Information Technology: New Generations. Latifi, S. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 432 - 439 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Group key management in wireless networks using session keys

Damodaran, D., Singh, R. & Le, P. D., 2006, Proceedings of the Third International Conference on Information Technology: New Generations. Latifi, S. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 402 - 407 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

The design & implementation of a wireless payment system

Wu, X., Dandash, O., Le, P. D. & Srinivasan, B., 2006, Proceedings of the First International Conference on Communication System Software and Middleware. Paul, S. & Venkatesh, G. (eds.). New Delhi India: IEEE, Institute of Electrical and Electronics Engineers, p. 1 - 5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

The design and implementation of a smartphone payment system based on limited-used key generation scheme

Wu, X., Dandash, O. & Le, P. D., 2006, Proceedings of the Third International Conference on Information Technology: New Generations. Latifi, S. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 458 - 463 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

The design of cluster-based group key management system in wireless networks

Chen, Y. J., Wang, Y. L., Wu, X. & Le, P. D., 2006, Proceedings of the 2006 10th International Conference on Communication Technology. Qiu, H., Lin, J., Zheng, L. & Li, X. (eds.). Beijing China: IEEE, Institute of Electrical and Electronics Engineers, p. 209 - 212 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2005

A comparative study of image comparison methods embedded by smart surveillance systems

Le, M. V., Le, P. D. & Srinivasan, B., 2005, Proceedings of the 2005 IEEE/ASME International Conference on Advanced Intelligent Mechatronics. Xi, N. (ed.). Monterey CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 82 - 87 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A limited-used key generation scheme for internet transactions

Kungpisdan, S., Le, P. D. & Srinivasan, B., 2005, Proceedings of the 5th International Workshop in Information Security Applications (WISA 2004). Lim, C. H. & Yung, M. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 3325. p. 302 - 316 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Secure group communications in wireless networks

Wang, Y. & Le, P. D., 2005, Proceedings of the Third International Conference on Advances in Mobile Mutimedia. Kotsis, G., Taniar, D., Bressan, S., Ibrahim, I. K. & mokhtar, S. (eds.). Vienna Austria: Austrian Computer Society (Oesterreichische Computer Gesellschaft), p. 241 - 252 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Wireless client-server application model using limited key generation technique

Singh, R., Damodaran, D. & Le, P. D., 2005, Proceedings of the Third International Conference on Advances in Mobile Multimedia. Kotsis, G., Taniar, D., Bressan, S., Ibrahim, I. K. & Mokhtar, S. (eds.). Vienna Austria: Austrian Computer Society (Oesterreichische Computer Gesellschaft), p. 253 - 263 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Wireless Internet Payment System using Smart Cards

Dandash, O., Wu, X. & Le, P. D., 2005, Proceedings of the International Conference on Information Technology: Coding and Computing. Selvaraj, H. & Srimani, P. K. (eds.). Los Alamitos USA: IEEE Computer Society, Vol. II. p. 16 - 21 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review