default search action
Lynn Margaret Batten
Person information
- affiliation: Deakin University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j40]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c50]Digby Mooney, Lynn Margaret Batten, Leo Yu Zhang:
A New Rabin-Type Cryptosystem with Modulus p2q. ATIS 2020: 61-77
2010 – 2019
- 2019
- [j39]Gang Li, Lynn Batten:
Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017). Concurr. Comput. Pract. Exp. 31(24) (2019) - [j38]Lynn Batten, Xun Yi:
Off-line digital cash schemes providing untraceability, anonymity and change. Electron. Commer. Res. 19(1): 81-110 (2019) - [e6]V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings. Communications in Computer and Information Science 1116, Springer 2019, ISBN 978-981-15-0870-7 [contents] - [i3]Lynn Margaret Batten, Hugh Cowie Williams:
Unique Rabin-Williams Signature Scheme Decryption. IACR Cryptol. ePrint Arch. 2019: 915 (2019) - 2018
- [j37]Gang Li, Jianlong Tan, Lynn Margaret Batten, Sohail S. Chaudhry:
IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks. IEEE Access 6: 61970-61972 (2018) - [j36]Menik Tissera, Robin Doss, Gang Li, Vicky H. Mak-Hau, Lynn Batten:
A Novel Approach for Information Discovery in Wireless Sensor Grids. J. Netw. Syst. Manag. 26(3): 640-662 (2018) - [c49]Scott T. E. Hirschfeld, Lynn Margaret Batten, Mohammed Khalil Amain:
Efficiencies in Binary Elliptic Curves. ICCSA (5) 2018: 246-260 - [e5]Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings. Communications in Computer and Information Science 950, Springer 2018, ISBN 978-981-13-2906-7 [contents] - 2017
- [j35]Muthukrishnan Senthil Kumar, Anthony Bonato, Lynn Batten:
Introduction to the Special section on Aadvanced Computing in Networking and Intelligent Systems. Comput. Electr. Eng. 57: 220-222 (2017) - [j34]Gang Li, Wenjia Niu, Lynn Batten, Jiqiang Liu:
New advances in securing cyberspace and curbing crowdturfing. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j33]Gang Li, Wenjia Niu, Jianlong Tan, Lynn Batten, Liang Chang:
Curbing collusive cyber-gossips for business brand management. Enterp. Inf. Syst. 11(10): 1457-1461 (2017) - [j32]Kalpana Singh, Lynn Batten:
Aggregating privatized medical data for secure querying applications. Future Gener. Comput. Syst. 72: 250-263 (2017) - [j31]Lei Pan, Xi Zheng, H. X. Chen, Tom H. Luan, H. Bootwala, Lynn Margaret Batten:
Cyber security attacks to modern vehicular systems. J. Inf. Secur. Appl. 36: 90-100 (2017) - [c48]Xi Zheng, Lei Pan, Hongxu Chen, Rick Di Pietro, Lynn Batten:
A Testbed for Security Analysis of Modern Vehicle Systems. TrustCom/BigDataSE/ICESS 2017: 1090-1095 - [e4]Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li:
Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings. Communications in Computer and Information Science 719, Springer 2017, ISBN 978-981-10-5420-4 [contents] - [i2]Lynn Batten, Xun Yi:
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change. IACR Cryptol. ePrint Arch. 2017: 1220 (2017) - 2016
- [j30]Gang Li, Wenjia Niu, Li Guo, Lynn Margaret Batten, Yinlong Liu, Guoyong Cai:
Securing cyberspace. Concurr. Comput. Pract. Exp. 28(6): 1870-1871 (2016) - [c47]Lynn Margaret Batten, Mohammed Khalil Amain:
A New Sign-Change Attack on the Montgomery Ladders. ATIS 2016: 3-14 - [c46]Swathi Parasa, Lynn Margaret Batten:
Mobile Money in the Australasian Region - A Technical Security Perspective. ATIS 2016: 154-162 - [c45]Gergely Alpár, Lejla Batina, Lynn Margaret Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan:
New directions in IoT privacy using attribute-based authentication. Conf. Computing Frontiers 2016: 461-466 - [e3]Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Communications in Computer and Information Science 651, 2016, ISBN 978-981-10-2740-6 [contents] - 2015
- [j29]W. P. Eureka Priyadarshani, Lynn Margaret Batten, Gihan N. Wikramanayake, Andrei V. Kelarev:
Cloud omnibus system for evaluating cloud market services. Int. J. Cloud Comput. 4(4): 335-352 (2015) - [c44]Menik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten:
Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks. FNSS 2015: 47-60 - [c43]Menik Tissera, Robin Doss, Gang Li, Lynn Batten:
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs. ITNAC 2015: 88-93 - 2014
- [j28]Gang Li, Wenjia Niu, Lynn Margaret Batten:
Special issue on behavior data security issues in network information propagation. Future Gener. Comput. Syst. 36: 120-121 (2014) - [c42]Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACISP 2014: 430-437 - [c41]Kalpana Singh, Jia Rong, Lynn Margaret Batten:
Sharing sensitive medical data sets for research purposes - A case study. DSAA 2014: 555-562 - [c40]Kalpana Singh, Jian Zhong, Lynn Margaret Batten, Peter Bertók:
A solution for privacy-preserving, remote access to sensitive data. ISITA 2014: 309-313 - [c39]Veelasha Moonsamy, Lynn Batten:
Android applications: Data leaks via advertising libraries. ISITA 2014: 314-317 - 2013
- [j27]Md. Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2): 646-656 (2013) - [c38]Menik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten:
Information discovery in multidimensional wireless sensor networks. ICOIN 2013: 54-59 - [c37]Menik Tissera, Robin Doss, Gang Li, Lynn Batten:
An adaptive approach to information discovery in multi-dimensional wireless sensor networks. ICST 2013: 203-208 - [c36]Kalpana Singh, Lynn Margaret Batten:
An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss. IFIPTM 2013: 263-271 - [c35]Veelasha Moonsamy, Lynn Margaret Batten, Malcolm Shore:
Can Smartphone Users Turn Off Tracking Service Settings? MoMM 2013: 455 - [c34]Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten:
Contrasting Permission Patterns between Clean and Malicious Android Applications. SecureComm 2013: 69-85 - [c33]Jahangir Dewan, Morshed U. Chowdhury, Lynn Margaret Batten:
e-Learning Content Authentication Using Bipartite Matching. SNPD 2013: 51-55 - 2012
- [j26]Lynn Margaret Batten, Lei Pan, Nisar Khan:
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations. Int. J. Digit. Crime Forensics 4(4): 1-14 (2012) - [j25]Veelasha Moonsamy, Moutaz Alazab, Lynn Margaret Batten:
Towards an understanding of the impact of advertising on data leaks. Int. J. Secur. Networks 7(3): 181-193 (2012) - [j24]Md. Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn Margaret Batten:
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. J. Networks 7(6): 946-955 (2012) - [c32]Golnoosh Tajadod, Lynn Margaret Batten, Govinda Kannayaram:
Microsoft and Amazon: A comparison of approaches to cloud security. CloudCom 2012: 539-544 - [c31]Moutaz Alazab, Veelasha Moonsamy, Lynn Margaret Batten, Patrik Lantz, Ronghua Tian:
Analysis of Malicious and Benign Android Applications. ICDCS Workshops 2012: 608-616 - [c30]Kalpana Singh, Jian Zhong, Vinod Mirchandani, Lynn Margaret Batten, Peter Bertók:
Securing Data Privacy on Mobile Devices in Emergency Health Situations. MobiSec 2012: 119-130 - [c29]Lei Pan, Nisar Khan, Lynn Margaret Batten:
Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations. WDFIA 2012: 76-86 - 2011
- [j23]Giannakis Antoniou, Lynn Margaret Batten:
E-commerce: protecting purchaser privacy to enforce trust. Electron. Commer. Res. 11(4): 421-456 (2011) - [c28]Bernard D. Colbert, Lynn Margaret Batten:
Dealing with Rogue Virtual Machines in a Cloud Services Environment. CLOSER 2011: 43-48 - [c27]Lynn Margaret Batten, Jemal H. Abawajy, Robin Doss:
Prevention of Information Harvesting in a Cloud Services Environment. CLOSER 2011: 66-72 - [c26]Veelasha Moonsamy, Ronghua Tian, Lynn Margaret Batten:
Feature Reduction to Speed Up Malware Classification. NordSec 2011: 176-188 - 2010
- [j22]Xun Yi, Lynn Margaret Batten:
Wireless broadcast encryption based on smart cards. Wirel. Networks 16(1): 153-165 (2010) - [c25]Lynn Margaret Batten, Lei Pan:
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. e-Forensics 2010: 40-52 - [c24]Ronghua Tian, Md. Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg:
Differentiating malware from cleanware using behavioural analysis. MALWARE 2010: 23-30 - [c23]Bai Li, Lynn Margaret Batten, Robin Doss:
Network Resilience in Low-Resource Mobile Wireless Sensor Networks. MobiSec 2010: 127-138 - [p1]Lynn Margaret Batten, Lei Pan:
Testing Digital Forensic Software Tools Used in Expert Testimony. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 257-278 - [i1]Bernard D. Colbert, Anthony H. Dekker, Lynn Margaret Batten:
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure. IACR Cryptol. ePrint Arch. 2010: 203 (2010)
2000 – 2009
- 2009
- [j21]Lei Pan, Lynn Margaret Batten:
Robust performance testing for digital forensic tools. Digit. Investig. 6(1-2): 71-81 (2009) - [j20]Bai Li, Lynn Margaret Batten:
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. J. Netw. Comput. Appl. 32(2): 377-387 (2009) - [c22]Lei Pan, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools. e-Forensics 2009: 54-64 - [c21]Giannakis Antoniou, Lynn Margaret Batten, Shivaramakrishnan Narayan, Parampalli Udaya:
A Privacy Preserving E-Payment Scheme. IDC 2009: 197-202 - [c20]Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam, Steven Versteeg:
An automated classification system based on the strings of trojan and virus families. MALWARE 2009: 23-30 - [c19]Bai Li, Lynn Margaret Batten, Robin Doss:
Lightweight Authentication for Recovery in Wireless Sensor Networks. MSN 2009: 465-471 - [c18]Bai Li, Robin Doss, Lynn Margaret Batten, Wolfgang Schott:
Fast Recovery from Node Compromise in Wireless Sensor Networks. NTMS 2009: 1-6 - 2008
- [j19]Lynn Margaret Batten, Lei Pan:
Teaching Digital Forensics to Undergraduate Students. IEEE Secur. Priv. 6(3): 54-56 (2008) - [j18]Lynn Margaret Batten, Xun Yi:
Efficient broadcast key distribution with dynamic revocation. Secur. Commun. Networks 1(4): 351-362 (2008) - [c17]Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya:
Designing Information Systems Which Manage or Avoid Privacy Incidents. EuroISI 2008: 131-142 - [c16]Lei Pan, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. IIH-MSP 2008: 534-537 - [c15]Giannakis Antoniou, Lynn Margaret Batten, Udaya Parampalli:
An Anonymity Revocation Technology for Anonymous Communication. ISD 2008: 329-337 - [c14]Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Function length as a tool for malware classification. MALWARE 2008: 69-76 - [c13]Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya:
A Trusted Approach to E-Commerce. Secure Data Management 2008: 119-132 - 2007
- [c12]Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert:
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. Inscrypt 2007: 201-215 - [c11]Lei Pan, Lynn Margaret Batten:
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools. IIH-MSP 2007: 103-107 - [c10]Giannakis Antoniou, Parampalli Udaya, Lynn Margaret Batten:
Monitoring Employees' Emails without Violating Their Privacy Right. PDCAT 2007: 46-50 - [c9]Lei Pan, Lynn Margaret Batten:
A Lower Bound on Effective Performance Testing for Digital Forensic Tools. SADFE 2007: 117-130 - 2006
- [c8]Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong:
Algebraic Attacks on Clock-Controlled Stream Ciphers. ACISP 2006: 1-16 - [c7]Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai:
Algebraic Attacks on Clock-Controlled Cascade Ciphers. INDOCRYPT 2006: 32-47 - [e2]Lynn Margaret Batten, Reihaneh Safavi-Naini:
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Lecture Notes in Computer Science 4058, Springer 2006, ISBN 3-540-35458-1 [contents] - 2005
- [c6]Lynn Batten, Tanya Castleman:
Securing Small Business - The Role of Information Technology Policy. ACIS 2005 - [c5]Lei Pan, Lynn Margaret Batten:
Reproducibility of Digital Evidence in Forensic Investigations. DFRWS 2005 - 2004
- [c4]Lynn Batten, Tanya Castleman, Darryl Coulthard:
eCommerce Strategy In A Multi-Sector Trading Environment . Quandaries For SMEs. Bled eConference 2004: 15 - [c3]Lynn Margaret Batten:
Algebraic Attacks Over GF(q). INDOCRYPT 2004: 84-91 - 2003
- [j17]Lynn Margaret Batten, Sharad S. Sane:
Permutations with a distinct difference property. Discret. Math. 261(1-3): 59-67 (2003) - [c2]Kieran F. Lim, Gleb Beliakov, Lynn Margaret Batten:
A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction. International Conference on Computational Science 2003: 1040-1049 - 2002
- [j16]Lynn Margaret Batten, Gleb Beliakov:
Fast Algorithm for the Cutting Angle Method of Global Optimization. J. Glob. Optim. 24(2): 149-161 (2002) - [c1]Matthew J. Warren, Lynn Margaret Batten:
Security Management: An Information Systems Setting. ACISP 2002: 257-270 - [e1]Lynn Margaret Batten, Jennifer Seberry:
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings. Lecture Notes in Computer Science 2384, Springer 2002, ISBN 3-540-43861-0 [contents] - 2001
- [j15]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk:
Broadcast anti-jamming systems. Comput. Networks 35(2-3): 223-236 (2001) - [j14]Lynn Margaret Batten, Jeremy M. Dover:
Blocking Semiovals of Type (1, m+1, n+1). SIAM J. Discret. Math. 14(4): 446-457 (2001) - 2000
- [j13]Lynn Margaret Batten:
Determining sets. Australas. J Comb. 22: 167-176 (2000) - [j12]Lynn Margaret Batten, Michelle Davidson, Leo Storme:
An analysis of Chen's construction of minimum-distance five codes. IEEE Trans. Inf. Theory 46(2): 505-511 (2000)
1990 – 1999
- 1999
- [j11]Lynn Margaret Batten, Jeremy M. Dover:
Some Sets of Type in Cubic Order Planes. Des. Codes Cryptogr. 16(3): 211-213 (1999) - 1997
- [j10]Lynn Margaret Batten, X. Bao:
Equitable colourings in the Witt designs. Australas. J Comb. 16: 175-182 (1997) - [j9]Lynn Margaret Batten, Kris Coolsaet, Anne Penfold Street:
Blocking Sets in (v, {2, 4}, 1)-Designs. Des. Codes Cryptogr. 10(3): 309-314 (1997) - 1993
- [b1]Lynn Margaret Batten, Albrecht Beutelspacher:
The theory of finite linear spaces - combinatorics of points and lines. Cambridge University Press 1993, ISBN 978-0-521-33317-7, pp. I-X, 1-213 - [j8]Lynn Margaret Batten:
The nonexistence of finite linear spaces with v=n2 points and b=n2+n+2 lines. Discret. Math. 115(1-3): 11-15 (1993) - [j7]Lynn Margaret Batten:
A characterization of finite linear spaces on v points, n2<=v<(n+1)2, andb=n2+n+3 lines, n>=10. Discret. Math. 118(1-3): 1-9 (1993) - 1991
- [j6]Lynn Margaret Batten:
An extension of Wagner's theorem. Discret. Math. 92(1-3): 21-23 (1991)
1980 – 1989
- 1989
- [j5]Lynn Margaret Batten:
Minimally projectively embeddable Steiner systems. Discret. Math. 77(1-3): 21-27 (1989) - 1988
- [j4]Lynn Margaret Batten:
Embedding pseudo-complements of quadrics in PG(n, q), n geq 3, q geq 2. J. Comb. Theory A 49(2): 338-348 (1988) - 1984
- [j3]Lynn Margaret Batten:
Rank functions of closure spaces of finite rank. Discret. Math. 49(2): 113-116 (1984) - [j2]Lynn Margaret Batten:
Embedding the complement of a minimal blocking set in a projective plane. Discret. Math. 52(1): 1-5 (1984) - 1983
- [j1]Lynn Margaret Batten:
Geodesic subgraphs. J. Graph Theory 7(2): 159-163 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint