Publications
A New Rabin-Type Cryptosystem with Modulus p2q
Digby Mooney, Lynn Batten, Leo Zhang
(2020), pp. 61-77, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Online from Brisbane, Qld., E1
Off-line digital cash schemes providing untraceability, anonymity and change
L Batten, X Yi
(2019), Vol. 19, pp. 81-110, Electronic commerce research, New York, N.Y., C1
A novel approach for information discovery in wireless sensor grids
M Tissera, R Doss, G Li, V Mak-Hau, L Batten
(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1
Efficiencies in binary elliptic curves
S Hirschfeld, L Batten, M Amain
(2018), Vol. 10964, pp. 246-260, ICCSA 2018 : Proceedings of the 18th International Conference on Computational Science and Applications, Melbourne, Vic., E1
Aggregating privatized medical data for secure querying applications
K Singh, L Batten
(2017), Vol. 72, pp. 250-263, Future generation computer systems, Amsterdam, The Netherlands, C1
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, H Chen, T Luan, H Bootwala, L Batten
(2017), Vol. 36, pp. 90-100, Journal of Information Security and Applications, C1
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1
L Batten, G Li
(2016), A7
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, I Natgunanathan
(2016), pp. 461-466, 2016 ACM International Conference on Computing Frontiers Proceedings, Como, Italy, E1
A new sign-change attack on the Montgomery ladders
L Batten, M Amain
(2016), Vol. 651, pp. 3-14, ATIS 2016 : Proceedings of the 6th International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Mobile money in the Australasian region - a technical security perspective
S Parasa, L Batten
(2016), Vol. 651, pp. 154-162, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Novel approach for information discovery in autonomous wireless sensor networks
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
Smartphone applications, malware and data theft
L Batten, V Moonsamy, M Alazab
(2015), Vol. 412, pp. 15-24, ICC3 : Proceedings of the 2nd International Conference on Computational Intelligence, Cyber Security & Computational Models, Coimbatore, Tamil Nadu, India, B1-1
Cryptographic public key length prediction
M Amain, L Batten
(2015), Vol. 557, pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1
Survey in smartphone malware analysis techniques
M Alazab, L Batten
(2015), pp. 105-130, New threats and countermeasures in digital crime and cyber terrorism, Hershey, Pa., B1
Cloud omnibus system for evaluating cloud market services
W Priyardarshani, L Batten, G Wikramanayake, A Kelarev
(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1
W Niu, G Li, J Liu, J Tan, L Guo, Z Han, L Batten
(2015), Berlin, Germany, A7
Segregation-of-duties conflicts in the insider threat landscape: an overview and case study
S Ballesteros, L Pan, L Batten, G Li
(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs
Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1
An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones
Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan
(2014), Vol. 8544, pp. 430-437, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1
The 0-1 Knapsack polytope - a starting point for cryptanalysis of Knapsack ciphers?
V Mak-Hau, L Batten
(2014), Vol. 490, pp. 171-182, Communications in Computer and Information Science, Berlin, Germany, B1
vPELS : An e-learning social environment for VLSI design with content security using DRM
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1
PELS: A noble architecture and framework for a personal E-learning system (PELS)
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1
Android applications: data leaks via advertising libraries
V Moonsamy, L Batten
(2014), pp. 314-317, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1
A solution for privacy-preserving, remote access to sensitive data
K Singh, J Zhong, L Batten, P Bertok
(2014), pp. 309-313, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1
Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec
V Moonsamy, L Batten
(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1
Sharing sensitive medical data sets for research purposes - a case study
K Singh, J Rong, L Batten
(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Shanghai, China, E1
Energy efficient information discovery approach for range queries in multi-dimensional WSNs
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1
An attack-resistant hybrid data-privatization method with low information loss
K Singh, L Batten
(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1
Contrasting permission patterns between clean and malicious android applications
V Moonsamy, J Rong, S Liu, G Li, L Batten
(2013), pp. 69-85, Security and privacy in communication networks, Berlin, Germany, B1
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, L Batten, S Versteeg
(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1
An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents
J Dewan, M Chowdhury, L Batten
(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1
eLearning content authentication using bipartite matching
J Dewan, M Chowdhury, L Batten
(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1
Information discovery in multidimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1
Can smartphone users turn off tracking service settings?
V Moonsamy, L Batten, M Shore
(2013), pp. 455-463, MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, E1
An adaptive approach to information discovery in multi-dimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
(2012), pp. 176-188, Information security technology for applications, Berlin , Germany, B1
Securing data privacy on mobile devices in emergency health situations
K Singh, J Zhong, V Mirchandani, L Batten, P Bertok
(2012), pp. 119-130, Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, Berlin, Germany, B1
A comparison of the classification of disparate malware collected in different time periods
R Islam, R Tian, V Moonsamy, L Batten
(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1
Hypothesis generation and testing in event profiling for digital forensic investigations
L Batten, L Pan, N Khan
(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
(2012), Vol. 7, pp. 181-193, International journal of security and networks, London, England, C1
Using hypothesis generation in event profiling for digital forensic investigations
L Pan, N Khan, L Batten
(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1
Analysis of malicious and benign Android applications
M Alazab, V Moonsamy, L Batten, R Tian, P Lantz
(2012), pp. 608-616, ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, E1
Zero permission android applications - attacks and defenses
V Moonsamy, L Batten
(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
Microsoft and Amazon : a comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
(2012), pp. 539-544, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1
An efficient solution for privacy-preserving, secure remote access to sensitive data
K Singh, J Zhong, L Batten, P Bertok
(2012), pp. 173-191, ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, Chennai, India, E1
Implementing recovery in low-resource stationary wireless sensor networks
B Li, L Batten, R Doss
(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1
E-commerce : protecting purchaser privacy to enforce trust
G Antoniou, L Batten
(2011), Vol. 11, pp. 421-456, Electronic commerce research, New York, N. Y., C1
Heraclitus : a LFSR-based stream cipher with key dependent structure
B Colbert, A Dekker, L Batten
(2011), pp. 141-145, ICCSP 2011 - International Conference on Communications and Signal Processing, Kerala, India, E1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1
Dealing with rogue virtual machines in a cloud services environment
B Colbert, L Batten
(2011), pp. 43-48, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1
Smartphone malware based on synchronisation vulnerabilities
M Alazab, A Alazab, L Batten
(2011), pp. 1-6, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, Sydney, N.S.W., E1
A comparison of the classification of disparate malware collected in different time periods
R Islam, R Tian, V Moonsamy, L Batten
(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1
Network resilience in low-resource mobile wireless sensor networks
B Li, L Batten, R Doss
(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1
Wireless broadcast encryption based on smart cards
X Yi, L Batten
(2010), Vol. 16, pp. 153-165, Wireless networks, New York, N.Y., C1
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Ballarat, Victoria, E1
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Nancy, France, E1
The padding scheme for RSA signatures
L Batten, C Wolf
(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Victoria, E1
Using relationship-building in event profiling for digital forensic investigations
L Batten, L Pan
(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1
A privacy preserving e-payment scheme
G Antoniou, L Batten, S Narayan, U Parampalli
(2009), Vol. 237, pp. 197-202, Studies in Computational Intelligence, Berlin, Germany, B1
An anonymity revocation technology for anonymous communication
G Antoniou, L Batten, U Parampalli
(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1
B Li, L Batten
(2009), Vol. 32, pp. 377-387, Journal of network and computer applications, London, England, C1
Robust performance testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1
Robust correctness testing for digital forensic tools
L Pan, L Batten
(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1
Fast recovery from node compromise in wireless sensor networks
B Li, R Doss, L Batten, W Schott
(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1
Lightweight authentication for recovery in wireless sensor networks
B Li, L Batten, R Doss
(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, Montréal, Quebec, Canada, E1
Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks
S Al-Hinai, L Batten, B Colbert
(2008), Vol. 4990, pp. 201-215, Lecture notes in computer science, Berlin, Germany, C1
Designing information systems which manage or avoid privacy incidents
G Antoniou, L Batten, U Parampalli
(2008), Vol. 5376, pp. 131-142, Lecture notes in computer science, Berlin, Germany, C1
A trusted approach to e-commerce
G Antoniou, L Batten, U Parampalli
(2008), Vol. 5159, pp. 119-132, Lecture notes in computer science, Berlin, Germany, C1
Efficient broadcast key distribution with dynamic revocation
L Batten, X Yi
(2008), Vol. 1, pp. 351-362, Security and communication networks, Malden, Mass., C1
Teaching digital forensics to undergraduate students
L Batten, L Pan
(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1
Function length as a tool for malware classification
R Tian, L Batten, S Versteeg
(2008), pp. 69-76, Proceedings of the 3rd International Conference on Malicious and Unwanted Software : MALWARE 2008, Alexandria, Va., E1
Measure of integrity leakage in live forensic context
L Pan, A Savoldi, P Gubian, L Batten
(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1
Linear spaces: geometric aspects
L Batten
(2007), pp. 506-512, Handbook of combinatorial designs, Boca Raton, FL, B1
Extending abelian groups to rings
L Batten, R Coulter, M Henderson
(2007), Vol. 82, pp. 297-313, Journal of the Australian mathematical society, Melbourne, Vic., C1
L Batten, G LeGrand
(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1
Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks
B Li, L Batten
(2007), pp. 2507-2510, WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, E1
B Li, L Batten
(2007), pp. 156-163, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, China, E1
A lower bound on effective performance testing for digital forensic tools
L Pan, L Batten
(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1
An effective and efficient testing methodology for correctness testing for file recovery tools
L Pan, L Batten
(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1
Monitoring employees emails without violating their privacy right
G Antoniou, U Parampalli, L Batten
(2007), pp. 46-50, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1
Compressed nested certificates provide more efficient PKI
A Jancic, L Batten
(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, Western Australia, E1
Information sharing in supply chain systems
L Batten, R Savage
(2006), pp. 67-82, Global integrated supply chain systems, Hershey, Pa., B1
L Batten, G LeGrand
(2006), pp. 415-424, Internet society II advances in education, commerce & governance, Southampton, England, B1
Algebraic attacks on clock-controlled stream ciphers
S Al-Hinai, L Batten, B Colbert, K Wong
(2006), Vol. 4058, pp. 1-16, Lecture notes in computer science, Berlin, Germany, C1
Skew arcs and Wagner's [23, 14, 5] code
M Davidson, L Batten
(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1
Algebraic attacks on clock-controlled cascade ciphers
K Wong, B Colbert, L Batten, S Al-Hinai
(2006), Vol. 4329, pp. 32-47, Lecture Notes in Computer Science, Berlin, Germany, C1
G LeGrand, L Batten
(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Canberra, A.C.T., E1
Securing small business - the role of information technology policy
L Batten, T Castleman
(2005), Proceedings of the 16th Australasian Conference on Information Systems, Sydney, Australia, E1
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1
L Batten
(2004), Vol. 3348, pp. 84-91, Lecture notes in computer science, Berlin, Germany, C1
Engaging suppliers in electronic trading across industry sectors
L Batten, T Castleman, C Chan, D Coulthard, R Savage, L Wilkins
(2004), pp. 182-199, Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, Salzburg, Austria, E1
Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs
D Coulthard, T Castleman, L Batten
(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1
Predicting molecular structures: an application of the cutting angle method
K Lim, G Beliakov, L Batten
(2003), Vol. 5, pp. 3884-3890, Physical chemistry chemical physics : PCCP, Cambridge, England, C1
Permutations with a distinct difference property
L Batten, S Sane
(2003), Vol. 261, pp. 59-67, Discrete mathematics, Amsterdam, Netherlands, C1
K Lim, G Beliakov, L Batten
(2003), pp. 1040-1049, ICCS 2003 : Proceedings of the 2003 International Conference on Computational Science, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 : proceedings, Melbourne, Vic. and St. Petersburg, Russia, E1
The major drawbacks to the use of wireless communication products in education
L Batten, M Chowdhury, J Drew
(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1
Etransactions in the Australian supply chain setting
L Batten, R Savage
(2003), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1
E-business security strategies for SMEs
L Batten, S Wasif
(2003), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, Western Australia, E1
Fast algorithm for the cutting angle method of global optimization
L Batten, G Beliakov
(2002), Vol. 24, pp. 149-161, Journal of global optimization, Dordrecht, The Netherlands, C1
Decompositions of finite projective planes
L Batten
(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1
Information warfare incident monitoring - government or public responsibility?
L Batten, M Warren
(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1
Security management: an information systems setting
M Warren, L Batten
(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Melbourne, Vic., E1
Blocking semiovals of Type (1,M+1,N+1)
L Batten, J Dover
(2001), Vol. 14, pp. 446-457, SIAM journal of discrete mathematics, Philadelphia, Pa., C1
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
(2001), Vol. 35, pp. 223-236, Computer networks, Amsterdam, The Netherlands, C1
Inferring eye movements on the basis of head and visual target position
L Batten, B Whiten
(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, South Australia, E1
Funded Projects at Deakin
Australian Competitive Grants
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications
Prof Edward Dawson, Prof Lynn Batten, Dr Leonie Simpson
ARC - Discovery Projects
- 2006: $16,666
Analysis and classification of malicious code
Prof Kathryn Horadam, Prof Lynn Batten, A/Prof Serdar Boztas, Dr Timothy Ebringer, Mr Jakub Kaminski, Ms Ronghua Tian
ARC Linkage - Projects Rnd 2, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry
- 2010: $75,790
- 2008: $34,145
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments
Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten
ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 1
- 2014: $14,358
- 2011: $26,843
Other Public Sector Funding
Recovery Mechanisms for Wireless Sensor Devices
Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm
DoD Grant - Research - Department of Defence
- 2009: $18,855
- 2008: $67,348
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments
Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten
Northern Health
- 2010: $7,860
Industry and Other Funding
Scholarship, Computer malware analysis
Prof Lynn Batten, Ms Ronghua Tian
CAP Scholarship - CA (PACIFIC) PTY LTD
- 2010: $76,227
- 2008: $86,140
- 2007: $30,000
AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications
Prof Lynn Batten, Miss Veelasha Moonsamy
ISC2, NBN Co Limited
- 2013: $24,581
AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co
Prof Lynn Batten, Miss Veelasha Moonsamy
NBN Co Limited
- 2013: $23,000
Supervisions
Mohammed Khalil Ibrahim Amain
Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems
Doctor of Philosophy (Information Technology), School of Information Technology
Veelasha Moonsamy
Thesis entitled: Security and Privacy of Users' Personal Information on Smartphones
Doctor of Philosophy (Information Technology), School of Information Technology
Kalpana Singh
Thesis entitled: Aggregating Privatized Medical Data for Secure Querying Applications
Doctor of Philosophy (Information Technology), School of Information Technology
Moutaz Alazab
Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware
Doctor of Philosophy (Information Technology), School of Information Technology
Luke Mason
Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy
Doctor of Philosophy (Information Technology), School of Information Technology
Bai Li
Thesis entitled: Recovery Mechanisms on Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Ronghua Tian
Thesis entitled: An Integrated Malware Detection and Classification System
Doctor of Philosophy (Information Technology), School of Information Technology
Ana Palavestra
Thesis entitled: Authentication in Public Key Encryption Schemes
Master of Science (Information Technology), School of Information Technology
Lei Pan
Thesis entitled: A Performance Testing Framework for Digital Forensic Tools
Doctor of Philosophy (Information Technology), School of Information Technology
Azmeri Khan
Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions
Doctor of Philosophy (Information Technology), School of Information Technology
Michelle Cyganowski
Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem
Master of Science (Information Technology), School of Information Technology
Daniel Stonier
Thesis entitled: Stability Theory and Numerical Analysis of Non-autonomous Dynamical Systems
Doctor of Philosophy (Information Technology), School of Information Technology
Thanh Binh Duong
Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems
Doctor of Philosophy (Information Technology), School of Information Technology
Nicholas Yannios
Thesis entitled: Computational Aspects of the Numerical Solution of SDEs
Doctor of Philosophy (Information Technology), School of Information Technology
Azmeri Khan
Thesis entitled: Adjusted adaptive cluster sampling
Master of Science, School of Information Technology
Jahangir Dewan
Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning
Doctor of Philosophy (Information Technology), School of Information Technology
Warnakulasuriya Menik Randi Tissera
Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology