460402. Data and information privacy


Title460402. Data and information privacy
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
Privacy in the age of remote sensing during natural disasters in Australia and Indonesia
Lawal, Temitope, Jackson, Melanie and Georgiades, Eugenia. 2023. "Privacy in the age of remote sensing during natural disasters in Australia and Indonesia." Digital Law Journal. 4 (2), pp. 15-39. https://doi.org/10.38044/2686-9136-2023-4-2-15-39

Article

Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform
Georgiades, Eugenia, Birt, James R. and Svantesson, Dan Jerker B. 2023. Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform. Australia. Bond University.

Project report

Data privacy and system security on cloud computing architechture for banking and financial services industry
Mahalle, Abhishek. 2023. Data privacy and system security on cloud computing architechture for banking and financial services industry. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/z4z0x

PhD Thesis

Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583

Article

Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190

Edited book (chapter)

A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
Li, Lin, Long, Sijie, Bi, Jiaxiu, Wang, Guowei, Zhang, Jiawei and Tao, Xiaohui. 2021. "A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean." Web Intelligence. 19 (4), pp. 329-342. https://doi.org/10.3233/WEB-210476

Article

Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Analysis of web based structural security patterns by employing ten security principles
Riaz, Rabia, Rizvi, Sanam Shehla, Riaz, Farina, Hameed, Nausheen and Shokat, Sana. 2017. "Analysis of web based structural security patterns by employing ten security principles." International Journal of Computer Science and Network Security. 17 (10), pp. 45-56.

Article

A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708

Article

An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.

Paper

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373

Article

A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065

Article

User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738

Edited book (chapter)

Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8

Article

Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86

PhD Thesis

Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router
Addie, Ronald and Natarajan, Joshua. 2017. "Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router." 8th EAI International Conference on Simulation Tools and Techniques (SIMUTOOLS 2015). Athens, Greece 24 - 26 Aug 2015 Belgium . Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). https://doi.org/10.4108/eai.24-8-2015.2260965

Paper

Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)
Georgiades, Eugenia, Caelli, William, Christensen, Sharon and Duncan, W.D.. 2013. "Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)." John Marshall Journal of Computer and Information Law. 30 (1).

Article

Attitudes towards information privacy
Cockcroft, Sophie and Clutterbuck, Peter. 2001. "Attitudes towards information privacy." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001 Australia.

Paper