Profile image of Lynn Batten

EmPr Lynn Batten

STAFF PROFILE

Position

Emeritus Professor

Faculty

Faculty of Sci Eng & Built Env

Department

Office of the Exec Dean SEBE

Campus

Off-Campus (Home)

Publications

Filter by

2020

A New Rabin-Type Cryptosystem with Modulus p2q

Digby Mooney, Lynn Batten, Leo Zhang

(2020), pp. 61-77, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Online from Brisbane, Qld., E1

conference
2019

Off-line digital cash schemes providing untraceability, anonymity and change

L Batten, X Yi

(2019), Vol. 19, pp. 81-110, Electronic commerce research, New York, N.Y., C1

journal article
2018

A novel approach for information discovery in wireless sensor grids

M Tissera, R Doss, G Li, V Mak-Hau, L Batten

(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1

journal article

Efficiencies in binary elliptic curves

S Hirschfeld, L Batten, M Amain

(2018), Vol. 10964, pp. 246-260, ICCSA 2018 : Proceedings of the 18th International Conference on Computational Science and Applications, Melbourne, Vic., E1

conference
2017

Aggregating privatized medical data for secure querying applications

K Singh, L Batten

(2017), Vol. 72, pp. 250-263, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, T Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of Information Security and Applications, C1

journal article

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference
2016

Applications and techniques in information security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, proceedings

L Batten, G Li

(2016), A7

edited book

New directions in IoT privacy using attribute-based authentication

G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, I Natgunanathan

(2016), pp. 461-466, 2016 ACM International Conference on Computing Frontiers Proceedings, Como, Italy, E1

conference

A new sign-change attack on the Montgomery ladders

L Batten, M Amain

(2016), Vol. 651, pp. 3-14, ATIS 2016 : Proceedings of the 6th International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Mobile money in the Australasian region - a technical security perspective

S Parasa, L Batten

(2016), Vol. 651, pp. 154-162, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference
2015

Novel approach for information discovery in autonomous wireless sensor networks

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

book chapter

Smartphone applications, malware and data theft

L Batten, V Moonsamy, M Alazab

(2015), Vol. 412, pp. 15-24, ICC3 : Proceedings of the 2nd International Conference on Computational Intelligence, Cyber Security & Computational Models, Coimbatore, Tamil Nadu, India, B1-1

book chapter

Cryptographic public key length prediction

M Amain, L Batten

(2015), Vol. 557, pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

book chapter

Survey in smartphone malware analysis techniques

M Alazab, L Batten

(2015), pp. 105-130, New threats and countermeasures in digital crime and cyber terrorism, Hershey, Pa., B1

book chapter

Cloud omnibus system for evaluating cloud market services

W Priyardarshani, L Batten, G Wikramanayake, A Kelarev

(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1

journal article

Applications and techniques in information security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

W Niu, G Li, J Liu, J Tan, L Guo, Z Han, L Batten

(2015), Berlin, Germany, A7

edited book

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference
2014

An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones

Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan

(2014), Vol. 8544, pp. 430-437, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

book chapter

The 0-1 Knapsack polytope - a starting point for cryptanalysis of Knapsack ciphers?

V Mak-Hau, V Mak-Hau, L Batten, L Batten

(2014), Vol. 490, pp. 171-182, Communications in Computer and Information Science, Berlin, Germany, B1-1

book chapter

vPELS : An e-learning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal article

PELS: A noble architecture and framework for a personal E-learning system (PELS)

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal article

Android applications: data leaks via advertising libraries

V Moonsamy, L Batten

(2014), pp. 314-317, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

A solution for privacy-preserving, remote access to sensitive data

K Singh, J Zhong, L Batten, P Bertok

(2014), pp. 309-313, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec

V Moonsamy, L Batten

(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1

conference

Sharing sensitive medical data sets for research purposes - a case study

K Singh, J Rong, L Batten

(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Shanghai, China, E1

conference

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1

conference
2013

An attack-resistant hybrid data-privatization method with low information loss

K Singh, L Batten

(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1

book chapter

Contrasting permission patterns between clean and malicious android applications

V Moonsamy, J Rong, S Liu, G Li, L Batten

(2013), pp. 69-85, Security and privacy in communication networks, Berlin, Germany, B1

book chapter

Classification of malware based on integrated static and dynamic features

R Islam, R Tian, L Batten, S Versteeg

(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

J Dewan, M Chowdhury, L Batten

(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1

journal article

eLearning content authentication using bipartite matching

J Dewan, M Chowdhury, L Batten

(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1

conference

Information discovery in multidimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1

conference

Can smartphone users turn off tracking service settings?

V Moonsamy, L Batten, M Shore

(2013), pp. 455-463, MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1

conference
2012

Feature reduction to speed up malware classification

V Moonsamy, R Tian, L Batten

(2012), pp. 176-188, Information security technology for applications, Berlin , Germany, B1

book chapter

Securing data privacy on mobile devices in emergency health situations

K Singh, J Zhong, V Mirchandani, L Batten, P Bertok

(2012), pp. 119-130, Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, Berlin, Germany, B1

book chapter

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1

journal article

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal article

Towards an understanding of the impact of advertising on data leaks

V Moonsamy, M Alazab, L Batten

(2012), Vol. 7, pp. 181-193, International journal of security and networks, London, England, C1

journal article

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Analysis of malicious and benign Android applications

M Alazab, V Moonsamy, L Batten, R Tian, P Lantz

(2012), pp. 608-616, ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, E1

conference

Zero permission android applications - attacks and defenses

V Moonsamy, L Batten

(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Microsoft and Amazon : a comparison of approaches to cloud security

G Tajadod, L Batten, K Govinda

(2012), pp. 539-544, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1

conference

An efficient solution for privacy-preserving, secure remote access to sensitive data

K Singh, J Zhong, L Batten, P Bertok

(2012), pp. 173-191, ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, Chennai, India, E1

conference
2011

Implementing recovery in low-resource stationary wireless sensor networks

B Li, L Batten, R Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

book chapter

E-commerce : protecting purchaser privacy to enforce trust

G Antoniou, L Batten

(2011), Vol. 11, pp. 421-456, Electronic commerce research, New York, N. Y., C1

journal article

Heraclitus : a LFSR-based stream cipher with key dependent structure

B Colbert, A Dekker, L Batten

(2011), pp. 141-145, ICCSP 2011 - International Conference on Communications and Signal Processing, Kerala, India, E1

conference

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Dealing with rogue virtual machines in a cloud services environment

B Colbert, L Batten

(2011), pp. 43-48, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Smartphone malware based on synchronisation vulnerabilities

M Alazab, A Alazab, L Batten

(2011), pp. 1-6, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, Sydney, N.S.W., E1

conference

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference
2010

Network resilience in low-resource mobile wireless sensor networks

B Li, L Batten, R Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

book chapter

Wireless broadcast encryption based on smart cards

X Yi, L Batten

(2010), Vol. 16, pp. 153-165, Wireless networks, New York, N.Y., C1

journal article

Classification of malware based on string and function feature selection

R Islam, R Tian, L Batten, S Versteeg

(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Ballarat, Victoria, E1

conference

Differentiating malware from cleanware using behavioural analysis

R Tian, R Islam, L Batten, S Versteeg

(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Nancy, France, E1

conference

The padding scheme for RSA signatures

L Batten, C Wolf

(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Victoria, E1

conference

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

A privacy preserving e-payment scheme

G Antoniou, L Batten, S Narayan, U Parampalli

(2009), Vol. 237, pp. 197-202, Studies in Computational Intelligence, Berlin, Germany, B1

book chapter

An anonymity revocation technology for anonymous communication

G Antoniou, L Batten, U Parampalli

(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1

book chapter

Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2009), Vol. 32, pp. 377-387, Journal of network and computer applications, London, England, C1

journal article

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal article

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference

Fast recovery from node compromise in wireless sensor networks

B Li, R Doss, L Batten, W Schott

(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1

conference

Lightweight authentication for recovery in wireless sensor networks

B Li, L Batten, R Doss

(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1

conference

An automated classification system based on the strings of trojan and virus families

R Tian, L Batten, R Islam, S Versteeg

(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, Montréal, Quebec, Canada, E1

conference
2008

Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks

S Al-Hinai, L Batten, B Colbert

(2008), Vol. 4990, pp. 201-215, Lecture notes in computer science, Berlin, Germany, C1

journal article

Designing information systems which manage or avoid privacy incidents

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5376, pp. 131-142, Lecture notes in computer science, Berlin, Germany, C1

journal article

A trusted approach to e-commerce

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5159, pp. 119-132, Lecture notes in computer science, Berlin, Germany, C1

journal article

Efficient broadcast key distribution with dynamic revocation

L Batten, X Yi

(2008), Vol. 1, pp. 351-362, Security and communication networks, Malden, Mass., C1

journal article

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1

journal article

Function length as a tool for malware classification

R Tian, L Batten, S Versteeg

(2008), pp. 69-76, Proceedings of the 3rd International Conference on Malicious and Unwanted Software : MALWARE 2008, Alexandria, Va., E1

conference

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

Linear spaces: geometric aspects

L Batten

(2007), pp. 506-512, Handbook of combinatorial designs, Boca Raton, FL, B1

book chapter

Extending abelian groups to rings

L Batten, R Coulter, M Henderson

(2007), Vol. 82, pp. 297-313, Journal of the Australian mathematical society, Melbourne, Vic., C1

journal article

A French-Australian comparison of responsibilities for the monitoring of security and privacy issues resulting from the introduction of new technologies

L Batten, G LeGrand

(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1

journal article

Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

B Li, L Batten

(2007), pp. 2507-2510, WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, E1

conference

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2007), pp. 156-163, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, China, E1

conference

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference

Monitoring employees emails without violating their privacy right

G Antoniou, U Parampalli, L Batten

(2007), pp. 46-50, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

Compressed nested certificates provide more efficient PKI

A Jancic, L Batten

(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, Western Australia, E1

conference

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2007), pp. 156-163, Proceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, E1-1

conference

Monitoring employees' emails without violating their privacy right

G Antoniou, U Parampalli, L Batten

(2007), pp. 46-50, Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, E1-1

conference
2006

Information sharing in supply chain systems

L Batten, R Savage

(2006), pp. 67-82, Global integrated supply chain systems, Hershey, Pa., B1

book chapter

A French-Australian comparison of attitudes towards security and privacy in modern information technologies

L Batten, G LeGrand

(2006), pp. 415-424, Internet society II advances in education, commerce & governance, Southampton, England, B1

book chapter

Algebraic attacks on clock-controlled stream ciphers

S Al-Hinai, L Batten, B Colbert, K Wong

(2006), Vol. 4058, pp. 1-16, Lecture notes in computer science, Berlin, Germany, C1

journal article

Skew arcs and Wagner's [23, 14, 5] code

M Davidson, L Batten

(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1

journal article

Algebraic attacks on clock-controlled cascade ciphers

K Wong, B Colbert, L Batten, S Al-Hinai

(2006), Vol. 4329, pp. 32-47, Lecture Notes in Computer Science, Berlin, Germany, C1

journal article

Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison

G LeGrand, L Batten

(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Canberra, A.C.T., E1

conference
2005

Securing small business - the role of information technology policy

L Batten, T Castleman

(2005), Proceedings of the 16th Australasian Conference on Information Systems, Sydney, Australia, E1

conference

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference
2004

Algebraic attacks over GF(q)

L Batten

(2004), Vol. 3348, pp. 84-91, Lecture notes in computer science, Berlin, Germany, C1

journal article

Engaging suppliers in electronic trading across industry sectors

L Batten, T Castleman, C Chan, D Coulthard, R Savage, L Wilkins

(2004), pp. 182-199, Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, Salzburg, Austria, E1

conference

Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs

D Coulthard, T Castleman, L Batten

(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1

conference
2003

Predicting molecular structures: an application of the cutting angle method

K Lim, G Beliakov, L Batten

(2003), Vol. 5, pp. 3884-3890, Physical chemistry chemical physics : PCCP, Cambridge, England, C1

journal article

Permutations with a distinct difference property

L Batten, S Sane

(2003), Vol. 261, pp. 59-67, Discrete mathematics, Amsterdam, Netherlands, C1

journal article

A new method for locating the global optimum : application of the cutting angle method to molecular structure prediction

K Lim, G Beliakov, L Batten

(2003), pp. 1040-1049, ICCS 2003 : Proceedings of the 2003 International Conference on Computational Science, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 : proceedings, Melbourne, Vic. and St. Petersburg, Russia, E1

conference

The major drawbacks to the use of wireless communication products in education

L Batten, M Chowdhury, J Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Etransactions in the Australian supply chain setting

L Batten, R Savage

(2003), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1

conference

E-business security strategies for SMEs

L Batten, S Wasif

(2003), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, Western Australia, E1

conference
2002

Fast algorithm for the cutting angle method of global optimization

L Batten, G Beliakov

(2002), Vol. 24, pp. 149-161, Journal of global optimization, Dordrecht, The Netherlands, C1

journal article

Decompositions of finite projective planes

L Batten

(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1

journal article

Information warfare incident monitoring - government or public responsibility?

L Batten, M Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1

conference

Security management: an information systems setting

M Warren, L Batten

(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Melbourne, Vic., E1

conference
2001

Blocking semiovals of Type (1,M+1,N+1)

L Batten, J Dover

(2001), Vol. 14, pp. 446-457, SIAM journal of discrete mathematics, Philadelphia, Pa., C1

journal article

Broadcast anti-jamming systems

Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk

(2001), Vol. 35, pp. 223-236, Computer networks, Amsterdam, The Netherlands, C1

journal article

Inferring eye movements on the basis of head and visual target position

L Batten, B Whiten

(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, South Australia, E1

conference
2000

Determining sets

L Batten

(2000), Vol. 22, pp. 167-176, Australasian Journal of Combinatorics, C1-1

journal article

An analysis of chen's construction of minimum-distance five codes

L Batten, M Davidson, L Storme

(2000), Vol. 46, pp. 505-511, IEEE Transactions on Information Theory, C1-1

journal article
1997

Equitable colourings in the Witt designs

L Batten, X Baa

(1997), Vol. 16, pp. 175-181, Australasian Journal of Combinatorics, C1-1

journal article
1993

The nonexistence of finite linear spaces with v=n2 points and b=n2+n+2 lines

L Batten

(1993), Vol. 115, pp. 11-15, Discrete Mathematics, C1-1

journal article

A characterization of finite linear spaces on v points, n2≤v<(n+1)2, andb=n2+n+3 lines, n≥10

L Batten

(1993), Vol. 118, pp. 1-9, Discrete Mathematics, C1-1

journal article
1991

A dual approach to embedding the complement of two lines in a finite projective plane

L Batten

(1991), Vol. 51, pp. 426-435, Journal of the Australian Mathematical Society, C1-1

journal article

Blocking sets with flag transitive collineation groups

L Batten

(1991), Vol. 56, pp. 412-416, Archiv der Mathematik, C1-1

journal article
1989

Translation triple systems

L Batten

(1989), Vol. 32, pp. 119-123, Geometriae Dedicata, C1-1

journal article

Minimally Projectively Embeddable Steiner Systems

L Batten

(1989), Vol. 42, pp. 21-27, Annals of Discrete Mathematics, C1-1

journal article

Minimally projectively embeddable Steiner systems

L Batten

(1989), Vol. 77, pp. 21-27, Discrete Mathematics, C1-1

journal article
1988

Embedding pseudo-complements of quadrics in PG(n, q), n≥3, q≥2

L Batten

(1988), Vol. 49, pp. 338-348, Journal of Combinatorial Theory, Series A, C1-1

journal article
1987

Locally generalized projective spaces

L Batten

(1987), Vol. 29, pp. 43-49, Journal of Geometry, C1-1

journal article

Locally generalized projective lattices satisfying a bundle theorem

L Batten

(1987), Vol. 22, pp. 363-369, Geometriae Dedicata, C1-1

journal article
1985

A characterization of the complement of the union of two disjoint Baer subplanes

L Batten, S Sane

(1985), Vol. 44, pp. 569-576, Archiv der Mathematik, C1-1

journal article
1984

Rank functions of closure spaces of finite rank

L Batten

(1984), Vol. 49, pp. 113-116, Discrete Mathematics, C1-1

journal article

Jordan-dedekind spaces

L Batten

(1984), Vol. 35, pp. 373-381, Quarterly Journal of Mathematics, C1-1

journal article

Embedding the complement of a minimal blocking set in a projective plane

L Batten

(1984), Vol. 52, pp. 1-5, Discrete Mathematics, C1-1

journal article
1983

Geodesic subgraphs

L Batten

(1983), Vol. 7, pp. 159-163, Journal of Graph Theory, C1-1

journal article

Finite linear spaces with two consecutive line degrees

P de Witte, L Batten

(1983), Vol. 14, pp. 225-235, Geometriae Dedicata, C1-1

journal article
1981

Correction to 'd-partition geometries'

L Batten

(1981), Vol. 11, pp. 385-386, Geometriae Dedicata, C1-1

journal article

Quadriques partielles d'indice deux

L Batten, F Buekenhout

(1981), Vol. 16, pp. 93-102, Journal of Geometry, C1-1

journal article
1980

Linear Spaces With Line Range {n-l, n, n+1} and at most n2 points

L Batten

(1980), Vol. 30, pp. 215-228, Journal of the Australian Mathematical Society, C1-1

journal article
1978

d-Partition geometries

L Batten

(1978), Vol. 7, pp. 63-69, Geometriae Dedicata, C1-1

journal article

Embedding d-partition geometries in generalized projective space

L Batten

(1978), Vol. 7, pp. 163-174, Geometriae Dedicata, C1-1

journal article

Funded Projects at Deakin

Australian Competitive Grants

Efficient and Secure Word-Based Stream Ciphers for Wireless Communications

Prof Edward Dawson, Prof Lynn Batten, Dr Leonie Simpson

ARC - Discovery Projects

  • 2006: $16,666

Analysis and classification of malicious code

Prof Kathryn Horadam, Prof Lynn Batten, A/Prof Serdar Boztas, Dr Timothy Ebringer, Mr Jakub Kaminski, Ms Ronghua Tian

ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 2

  • 2010: $75,790
  • 2008: $34,145

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 1

  • 2014: $14,358
  • 2011: $26,843

Other Public Sector Funding

Recovery Mechanisms for Wireless Sensor Devices

Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm

DoD Grant - Research - Department of Defence

  • 2009: $18,855
  • 2008: $67,348

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

Northern Health

  • 2010: $7,860

Industry and Other Funding

Scholarship, Computer malware analysis

Prof Lynn Batten, Ms Ronghua Tian

CAP Scholarship - CA (PACIFIC) PTY LTD

  • 2010: $76,227
  • 2008: $86,140
  • 2007: $30,000

AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications

Prof Lynn Batten, Miss Veelasha Moonsamy

NBN Co Limited, ISC2

  • 2013: $24,581

AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co

Prof Lynn Batten, Miss Veelasha Moonsamy

NBN Co Limited

  • 2013: $23,000

Supervisions

Principal Supervisor
2019

Mohammed Khalil Ibrahim Amain

Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Kalpana Singh

Thesis entitled: Aggregating Privatized Medical Data for Secure Querying Applications

Doctor of Philosophy (Information Technology), School of Information Technology

Veelasha Moonsamy

Thesis entitled: Security and Privacy of Users' Personal Information on Smartphones

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Luke Mason

Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy

Doctor of Philosophy (Information Technology), School of Information Technology

Bai Li

Thesis entitled: Recovery Mechanisms on Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Ronghua Tian

Thesis entitled: An Integrated Malware Detection and Classification System

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ana Palavestra

Thesis entitled: Authentication in Public Key Encryption Schemes

Master of Science (Information Technology), School of Information Technology

2008

Lei Pan

Thesis entitled: A Performance Testing Framework for Digital Forensic Tools

Doctor of Philosophy (Information Technology), School of Information Technology

2004

Azmeri Khan

Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions

Doctor of Philosophy (Information Technology), School of Information Technology

Michelle Cyganowski

Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem

Master of Science (Information Technology), School of Information Technology

2003

Daniel Stonier

Thesis entitled: Stability Theory and Numerical Analysis of Non-autonomous Dynamical Systems

Doctor of Philosophy (Information Technology), School of Information Technology

2002

Thanh Binh Duong

Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems

Doctor of Philosophy (Information Technology), School of Information Technology

Nicholas Yannios

Thesis entitled: Computational Aspects of the Numerical Solution of SDEs

Doctor of Philosophy (Information Technology), School of Information Technology

1998

Azmeri Khan

Thesis entitled: Adjusted adaptive cluster sampling

Master of Science, School of Information Technology

Associate Supervisor
2017

Jahangir Dewan

Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Warnakulasuriya Menik Randi Tissera

Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology