| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2021 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2019 | — | conf |
ACSW
|
| 2018 | — | conf |
PACIS
|
| 2017 | C | conf |
IPCCC
|
| 2015 | — | conf |
IFIPTM
|
| 2015 | J | jnl |
Softw. Pract. Exp.
|
| 2015 | C | conf |
HealthCom
|
| 2013 | — | conf |
World Conference on Information Security Education
|
| 2013 | Misc | conf |
SEC
|
| 2013 | J | jnl |
Int. J. E Health Medical Commun.
|
| 2012 | J | jnl |
J. Softw.
|
| 2012 | C | conf |
Healthcom
|
| 2012 | J | jnl |
Comput. Secur.
|
| 2012 | J | jnl |
Int. J. Inf. Secur. Priv.
|
| 2011 | — | conf |
PACIS
|
| 2011 | — | conf |
PACIS
|
| 2010 | Misc | conf |
SEC
|
| 2010 | C | conf |
HPCC
|
| 2010 | — | conf |
HCC
|
| 2009 | Misc | conf |
AISC
|
| 2008 | Misc | conf |
SEC
|
| 2007 | — | conf |
ACIS
|
| 2007 | C | conf |
ISPEC
|
| 2007 | Misc | conf |
SEC
|
| 2007 | — | conf |
ACSW
|
| 2007 | — | conf |
MedInfo
|
| 2006 | Misc | conf |
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.
ACISP
|
| 2005 | — | conf |
ACSW
|
| 2005 | Misc | conf |
ACISP
|
| 2004 | — | conf |
ACSC
|
| 2004 | — | conf |
ACSC
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2001 | Misc | conf |
SEC
|
| 2001 | J | jnl |
J. Inf. Law Technol.
|
| 2000 | J | jnl |
First Monday
|
| 1999 | — | conf |
Conference on Information Security Management & Small Systems Security
|
| 1999 | J | jnl |
Comput. Secur.
|
| 1998 | C | conf |
CARDIS
|
| 1997 | Misc | conf |
SEC
|
| 1997 | — | conf |
PACIS
|
| 1995 | — | conf |
Cryptography: Policy and Algorithms
|
| 1995 | — | conf |
Cryptography: Policy and Algorithms
|
| 1995 | — | conf |
Cryptography: Policy and Algorithms
|
| 1994 | J | jnl |
Comput. Secur.
|
| 1994 | J | jnl |
Inf. Manag.
|
| 1994 | J | jnl |
Comput. Secur.
|
| 1994 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 1993 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 1993 | J | jnl |
Comput. Secur.
|
| 1992 | Misc | conf |
SEC
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | Misc | ed. |
SEC
|
| 1992 | Misc | conf |
SEC
|
| 1991 | J | jnl |
Cryptologia
|
| 1990 | — | conf |
AUSCRYPT
|
| 1990 | J | jnl |
Aust. Comput. J.
|
| 1988 | J | jnl |
Aust. Comput. J.
|
| 1987 | J | jnl |
Aust. Comput. J.
|
| 1985 | J | jnl |
Aust. Comput. J.
|
| 1979 | J | jnl |
Aust. Comput. J.
|