Lynn M. Batten's research while affiliated with Deakin University and other places

Publications (4)

Chapter
This paper discusses the choices of elliptic curve models available to the would-be implementer, and assists the decision as to which model to use by examining the links between security and efficiency. In early public key cryptography schemes, such as ElGamal and RSA, the use of finite fields over large prime numbers was prevalent, thus preventing...
Article
As online social networks are reshaping the way users share their daily experiences, and the way business practitioners manage their marketing activities, crowdturfing has been emerging as a potential threat that concerns many users. If no proper measures are taken, it may result in a crisis, such as public opinion being misled. In general, crowdtu...
Book
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissi...
Book
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers a...