HOME   PUBLICATIONS   TEACHING   MY STUDENTS   SERVICE   GRANTS    SCHOOL   UOW    CRYPTO LINK    CFP

     Service to University

  • Head of School (2011-2015)
  • Co-director, Centre for Computer and Information Security Research (CCISR)
  • University Research Committee (2006-2008)
  • University Thesis Examination Committee (2006-2009)
  • Head of SCSSE Postgraduate Studies (Research Student Coordinator) (2006-2010)
  • Informatics Research Committee
Journal Editorial
  1. Editor in Chief, International Journal of Applied Cryptography (IJACT), Inderscience.

    Editorial Board or Associate Editor:

  2. Information Sciences , Elsevier.
  3. The Computer Journal , Oxford.
  4. International Journal of Security and Networks (IJSN) , Inderscience.
  5. Journal of Security and Communication Networks (SCN) , Wiley.
  6. International Journal of Wireless and Mobile Computing (IJWMC) , Inderscience.
  7. Journal of Autonomic and Trusted Computing (JoATC) (Click here for the alternative website)
  8. Journal of Computer Science and Technology (JCST) , Springer.
  9. Journal of Universal Computer Science (JUCS)
  10. International Journal of Wireless and Mobile Computing , Indersceince
  11. International Journal of Advanced Science and Technology (IJAST)
  12. International Journal of Information Technology, Communications and Convergence (IJITCC)

  13. Guest Editor, Advances in Cryptography, Security and Applications for Future Computer Science, Journal of Computers & Mathematics with Applications, Volume 60, Issue 2 (2010), pages 175-376.
  14. Guest Editor, Special Issue on Advances in Digital Forensics for Communications and Networking, IEEE Journal on Selected Areas in Communications, 2010
  15. Guest Editor, Special Issue on Security of Computer Network and Mobile Systems, International Journal of Wireless and Mobile Computing (IJWMC), 2005
  16. Guest Editor, Special Issue on Cryptography in Networks, International Journal of Security and Networks (IJSN), 2006
  17. Guest Editor, Special Issue on Cryptography in Computer System Security, Journal of Universal Computer Science (JUCS), 2007

     Steering Committee

  1. International Conference on Cryptology and Network Security (CANS)
  2. AsiaCCS
  3. ProvSec

     Conference Committee (incomplete)

     Conference Chairs of Major Conferences:

  1. Program Co-Chair, the 13th Australasian Conference on Information Security and Privacy (ACISP 2001, 2008)
  2. Program Co-Chair, the 4th Information Security Practice and Experience Conference (ISPEC 2008)
  3. General Chair, International Conference on Provable Security (ProvSec 2007)
  4. Program Co-Chair, The 5th Conference of Cryptology and Network Security (CANS 2006)
  5. Program Co-chair, Second International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 06)
  6. General Co-Chair, The 4th Conference of Cryptology and Network Security (CANS 2005)

     Technical Program Committee of Major Conferences (over 120 other conferences):

  1. ACM Conference on Computer and Communication Security (CCS 2007)
  2. European Symposium on Research in Computer Security (ESORICS 2008)
  3. Australasian Conference on Information Security and Privacy (ACISP 1997, 2002, 2003, 2004, 2007, 2008, 2009, 2010)
  4. ACM Symposium on Information, Computer and Communications Security, 2008 (AsiaCCS 2007, 2008)
  5. International Conference on Information and Communications Security (ICICS 1999, 2008)
  6. International Conference on Cryptology and Network Security (CANS 2001, 2002, 2003, 2006, 2007, 2008, 2009)
  7. International Conference on Information Security and Cryptology (ICISC 2004, 2005, 2006, 2007)
  8. European PKI Workshop: Theory and Practice (EuroPKI 2007, 2008, 2010)
  9. The 5th China International Conferences on Information Security and Cryptology (Inscrypt 2009)
  10. Information Security Practice and Experience Conference (ISPEC 2007, 2008, 2009)
  11. International Conference on Provable Security (ProvSec 2008, 2009)
  12. International Conference on Security and Cryptography (SECRYPT 2006, 2007,2008, 2009)
  13. The 6th Workshop on RFID Security (RFIDsec'10 Asia)
  14. The 2nd International Conference on Trusted Computing (Trust 2009)
  15. International Conference on Trusted Systems (INTRUST 2010)
  16. International Conference on Security and Privacy in Communication Networks (SecureComm 2010),
  17. The 20th International Conference on Database- and Expert Systems Applications conference (DEXA 2009)