Select Publications
Book Chapters
2021, '3D Fingerprint', in Encyclopedia of Cryptography, Security and Privacy, Springer, Berlin, Heidelberg, http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1
,2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119
,2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1
,2018, 'EEG-based biometrics for person identification and continuous authentication', in Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13
,2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170, http://dx.doi.org/10.1049/PBSE004E_ch7
,2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, CRC Press, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3
,2012, 'A General Transformation from KP-ABE to Searchable Encryption', in Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14
,2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019
,2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7
,2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13
,2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11
,2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20
,2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331, http://dx.doi.org/10.1007/978-3-642-04117-4_17
,2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, Elsevier, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2
,2006, 'Wireless interactive teaching by using keypad-based ARS', in Audience Response Systems in Higher Education: Applications and Cases, pp. 209 - 221, http://dx.doi.org/10.4018/978-1-59140-947-2.ch014
,