Queensland University of Technology

Displaying 1-23 of 23 results

  • White Papers // Dec 2011

    Improving Usability of Password Management With Standardized Password Policies

    Recent studies indicate that many users have difficulties managing online passwords for the increasing number of accumulated accounts. As a result, users often adopt strategies to simplify password management, such as selecting weak passwords and reusing passwords across multiple accounts, which unfortunately can cause security vulnerabilities. This problem is exacerbated...

    Provided By Queensland University of Technology

  • White Papers // Nov 2011

    Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection

    Client puzzles are moderately-hard cryptographic problems - neither easy nor impossible to solve - that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity....

    Provided By Queensland University of Technology

  • White Papers // Nov 2011

    Gap Analysis of Intrusion Detection in Smart Grids

    Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional Intrusion Detection Systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap...

    Provided By Queensland University of Technology

  • White Papers // Apr 2011

    Defending Web Services Against Denial of Service Attacks Using Client Puzzles

    The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to Denial of Service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. The authors investigate the effectiveness of defending...

    Provided By Queensland University of Technology

  • White Papers // Apr 2011

    Measuring Globalization: A Hierarchical Network Approach

    This paper investigates the business cycle co-movement across countries and regions since the middle of the last century as a measure for quantifying the ongoing globalization process of the world economy. The authors' methodological approach is based on analysis of a correlation matrix and the networks it contains. Such an...

    Provided By Queensland University of Technology

  • White Papers // Feb 2011

    An RPC-Based Service Framework for Robot and Sensor Network Integration

    The authors describe and evaluate a new programming and communications framework that eases the creation of complex heterogeneous systems comprising robots and sensor networks. They use a light-weight RPC-based service framework that allows robots and static sensor nodes to be considered as services, accessible to an internet connected end-user, or...

    Provided By Queensland University of Technology

  • White Papers // Jan 2011

    Prospectives for Online Trust Management

    Innovation in technologies for online service provision has been explosive during the relatively short history of the Internet, and this trend shows no sign of slowing down. As a result there is an enormous amount and variety of resources available online. Currently there is little control over the quality of...

    Provided By Queensland University of Technology

  • White Papers // Dec 2010

    Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols

    Client puzzles are meant to act as a defense against Denial of Service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions do not ensure that solving n puzzles is n times harder than...

    Provided By Queensland University of Technology

  • White Papers // Jul 2010

    A Conceptual Framework For Not-For-Profit Sustainability: Renovation Or Reconstruction?

    This paper identifies how a stewardship approach can enhance Not-For-Profit (NFP) sustainability, advocates a NFP-specific conceptual framework, and illustrates the potential of a stewardship foundation to resolve NFP financial reporting issues. Archival sources are used to examine contentious conceptual framework and NFP financial reporting issues. Concepts are theorized through metaphor....

    Provided By Queensland University of Technology

  • White Papers // Jul 2010

    An International Comparison Of Not-For-Profit Accounting Regulation

    This paper examines and compares the different regulatory systems and processes that five jurisdictions adopt to develop not-for-profit accounting regimes. The paper draws upon publicly available archival data, using the analytical construct of regulatory space. Internationally, the not-for-profit regulatory space is rapidly changing. Challenges such as the adoption of IFRS...

    Provided By Queensland University of Technology

  • White Papers // Apr 2010

    Attribute-Based Authenticated Key Exchange

    The authors introduce the concept of Attribute-Based Authenticated Key Exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext...

    Provided By Queensland University of Technology

  • White Papers // Apr 2010

    Predicate-Based Key Exchange

    The authors provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, the security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they...

    Provided By Queensland University of Technology

  • White Papers // Feb 2010

    One Round Group Key Exchange With Forward Security in the Standard Model

    Constructing a one round Group Key Exchange (GKE) protocol that provides forward secrecy is an open problem in the literature. In this paper, the authors investigate whether or not the security of one round GKE protocols can be enhanced with any form of forward secrecy without increasing the number of...

    Provided By Queensland University of Technology

  • White Papers // Feb 2010

    On the Use of Factor Analysis With Restricted Target Data in Speaker Verification

    Factor Analysis (FA) based techniques have become the state of the art in automatic speaker verification thanks to their great ability to model session variability. This ability, in turn, relies on accurately estimating a session variability subspace for the operating conditions of interest. In cases such as forensic speaker recognition,...

    Provided By Queensland University of Technology

  • White Papers // Nov 2009

    ?Try Hard?: Attitudes To Advertising In Online Social Networks

    Advertising has recently entered many new spaces it does not fully understand. The rules that apply in traditional media do not always translate in new media environments. However, their low cost of entry and the availability of hard-to-reach target markets, such as Generation Y, make environments such as online social...

    Provided By Queensland University of Technology

  • White Papers // Sep 2009

    One-Time-Password-Authenticated Key Exchange

    To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the...

    Provided By Queensland University of Technology

  • White Papers // Sep 2009

    Open Standards-Based System Integration for Asset Management Decision Support

    Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions - as a new integration scenario requirement arises, a custom solution is built between the relevant systems. Bus-based solutions are now preferred, whereby...

    Provided By Queensland University of Technology

  • White Papers // Aug 2009

    Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic

    Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication...

    Provided By Queensland University of Technology

  • White Papers // Apr 2009

    Towards Denial-of-Service-Resilient Key Agreement Protocols

    Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models. Many protocols have been...

    Provided By Queensland University of Technology

  • White Papers // Jan 2009

    Towards A CRM And SCM Benefits Measurement Model

    Organizations invest heavily in Customer Relationship Management (CRM) and Supply Chain Management (SCM) systems, and their related infrastructure, presumably expecting positive benefits to the organization. Assessing the benefits of such systems is an important aspect of managing such systems. Given the substantial differences between CRM and SCM systems with traditional...

    Provided By Queensland University of Technology

  • White Papers // Dec 2008

    On Optimal Public Key Certificates for M-Commerce

    Processing of digital certificates on handsets during m-commerce slows response time. Passive data certificates as used in the Internet are not designed with speed of processing in mind, are not optimal for time or space, and are not scalable in the wireless environment in that modifications require changes to software...

    Provided By Queensland University of Technology

  • White Papers // Nov 2008

    Experiments in Integrating Autonomous Uninhabited Aerial Vehicles (UAVs) and Wireless Sensor Networks

    This paper is concerned with the integration and control of UAVs and wireless sensor networks, an approach that is useful in isolated areas where communication between ground nodes might be difficult. The authors present the preliminary design for a fixed-wing aircraft carrying a wireless sensor node which acts as a...

    Provided By Queensland University of Technology

  • White Papers // Jun 2002

    Granular Synthesis: Experiments in Live Performance

    This paper gives an overview of the making of a real-time granular synthesis instrument that can be used for live performances and improvisation with other instruments including traditional acoustic instruments. It outlines the design and performance of a musical instrument based upon this Synthesis method. The instrument, design, process, and...

    Provided By Queensland University of Technology

  • White Papers // Jan 2011

    Prospectives for Online Trust Management

    Innovation in technologies for online service provision has been explosive during the relatively short history of the Internet, and this trend shows no sign of slowing down. As a result there is an enormous amount and variety of resources available online. Currently there is little control over the quality of...

    Provided By Queensland University of Technology

  • White Papers // Dec 2011

    Improving Usability of Password Management With Standardized Password Policies

    Recent studies indicate that many users have difficulties managing online passwords for the increasing number of accumulated accounts. As a result, users often adopt strategies to simplify password management, such as selecting weak passwords and reusing passwords across multiple accounts, which unfortunately can cause security vulnerabilities. This problem is exacerbated...

    Provided By Queensland University of Technology

  • White Papers // Nov 2011

    Gap Analysis of Intrusion Detection in Smart Grids

    Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional Intrusion Detection Systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap...

    Provided By Queensland University of Technology

  • White Papers // Feb 2010

    On the Use of Factor Analysis With Restricted Target Data in Speaker Verification

    Factor Analysis (FA) based techniques have become the state of the art in automatic speaker verification thanks to their great ability to model session variability. This ability, in turn, relies on accurately estimating a session variability subspace for the operating conditions of interest. In cases such as forensic speaker recognition,...

    Provided By Queensland University of Technology

  • White Papers // Aug 2009

    Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic

    Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication...

    Provided By Queensland University of Technology

  • White Papers // Nov 2011

    Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection

    Client puzzles are moderately-hard cryptographic problems - neither easy nor impossible to solve - that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity....

    Provided By Queensland University of Technology

  • White Papers // Jun 2002

    Granular Synthesis: Experiments in Live Performance

    This paper gives an overview of the making of a real-time granular synthesis instrument that can be used for live performances and improvisation with other instruments including traditional acoustic instruments. It outlines the design and performance of a musical instrument based upon this Synthesis method. The instrument, design, process, and...

    Provided By Queensland University of Technology

  • White Papers // Sep 2009

    Open Standards-Based System Integration for Asset Management Decision Support

    Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions - as a new integration scenario requirement arises, a custom solution is built between the relevant systems. Bus-based solutions are now preferred, whereby...

    Provided By Queensland University of Technology

  • White Papers // Dec 2008

    On Optimal Public Key Certificates for M-Commerce

    Processing of digital certificates on handsets during m-commerce slows response time. Passive data certificates as used in the Internet are not designed with speed of processing in mind, are not optimal for time or space, and are not scalable in the wireless environment in that modifications require changes to software...

    Provided By Queensland University of Technology

  • White Papers // Jan 2009

    Towards A CRM And SCM Benefits Measurement Model

    Organizations invest heavily in Customer Relationship Management (CRM) and Supply Chain Management (SCM) systems, and their related infrastructure, presumably expecting positive benefits to the organization. Assessing the benefits of such systems is an important aspect of managing such systems. Given the substantial differences between CRM and SCM systems with traditional...

    Provided By Queensland University of Technology

  • White Papers // Nov 2009

    ?Try Hard?: Attitudes To Advertising In Online Social Networks

    Advertising has recently entered many new spaces it does not fully understand. The rules that apply in traditional media do not always translate in new media environments. However, their low cost of entry and the availability of hard-to-reach target markets, such as Generation Y, make environments such as online social...

    Provided By Queensland University of Technology

  • White Papers // Dec 2010

    Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols

    Client puzzles are meant to act as a defense against Denial of Service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions do not ensure that solving n puzzles is n times harder than...

    Provided By Queensland University of Technology

  • White Papers // Apr 2010

    Attribute-Based Authenticated Key Exchange

    The authors introduce the concept of Attribute-Based Authenticated Key Exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext...

    Provided By Queensland University of Technology

  • White Papers // Feb 2010

    One Round Group Key Exchange With Forward Security in the Standard Model

    Constructing a one round Group Key Exchange (GKE) protocol that provides forward secrecy is an open problem in the literature. In this paper, the authors investigate whether or not the security of one round GKE protocols can be enhanced with any form of forward secrecy without increasing the number of...

    Provided By Queensland University of Technology

  • White Papers // Sep 2009

    One-Time-Password-Authenticated Key Exchange

    To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the...

    Provided By Queensland University of Technology

  • White Papers // Jul 2010

    A Conceptual Framework For Not-For-Profit Sustainability: Renovation Or Reconstruction?

    This paper identifies how a stewardship approach can enhance Not-For-Profit (NFP) sustainability, advocates a NFP-specific conceptual framework, and illustrates the potential of a stewardship foundation to resolve NFP financial reporting issues. Archival sources are used to examine contentious conceptual framework and NFP financial reporting issues. Concepts are theorized through metaphor....

    Provided By Queensland University of Technology

  • White Papers // Jul 2010

    An International Comparison Of Not-For-Profit Accounting Regulation

    This paper examines and compares the different regulatory systems and processes that five jurisdictions adopt to develop not-for-profit accounting regimes. The paper draws upon publicly available archival data, using the analytical construct of regulatory space. Internationally, the not-for-profit regulatory space is rapidly changing. Challenges such as the adoption of IFRS...

    Provided By Queensland University of Technology

  • White Papers // Apr 2011

    Measuring Globalization: A Hierarchical Network Approach

    This paper investigates the business cycle co-movement across countries and regions since the middle of the last century as a measure for quantifying the ongoing globalization process of the world economy. The authors' methodological approach is based on analysis of a correlation matrix and the networks it contains. Such an...

    Provided By Queensland University of Technology

  • White Papers // Apr 2011

    Defending Web Services Against Denial of Service Attacks Using Client Puzzles

    The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to Denial of Service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. The authors investigate the effectiveness of defending...

    Provided By Queensland University of Technology

  • White Papers // Apr 2010

    Predicate-Based Key Exchange

    The authors provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, the security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they...

    Provided By Queensland University of Technology

  • White Papers // Apr 2009

    Towards Denial-of-Service-Resilient Key Agreement Protocols

    Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models. Many protocols have been...

    Provided By Queensland University of Technology

  • White Papers // Feb 2011

    An RPC-Based Service Framework for Robot and Sensor Network Integration

    The authors describe and evaluate a new programming and communications framework that eases the creation of complex heterogeneous systems comprising robots and sensor networks. They use a light-weight RPC-based service framework that allows robots and static sensor nodes to be considered as services, accessible to an internet connected end-user, or...

    Provided By Queensland University of Technology

  • White Papers // Nov 2008

    Experiments in Integrating Autonomous Uninhabited Aerial Vehicles (UAVs) and Wireless Sensor Networks

    This paper is concerned with the integration and control of UAVs and wireless sensor networks, an approach that is useful in isolated areas where communication between ground nodes might be difficult. The authors present the preliminary design for a fixed-wing aircraft carrying a wireless sensor node which acts as a...

    Provided By Queensland University of Technology