Dr.
Kim-Kwang Raymond Choo
University
of South Australia and Australian National University, Australia
Email: raymond.choo.au@gmail.com
Qualifications
2006 Ph.D.,
Information Security Institute Queensland University of Technology
Publications
(Selected)
-
Choo
K-K R 2009. Online child grooming: A literature review on the misuse of
social networking sites for grooming children for sexual offences. Research and
public policy No 103, Australian Institute of Criminology.
-
Choo
K-K R 2008. Secure Key Establishment. Advances in Information Security Book
series Volume 41. Springer Science+Business Media, LLC.
-
Urbas
G and Choo K-K R 2008. Resource materials on technology-enabled crime.
Technical and background paper No 28, Australian Institute of Criminology.
-
Choo
K-K R, Smith R G and McCusker R 2007. Future directions in
technology-enabled crime : 2007-2009. Research and public policy No 78,
Australian Institute of Criminology.
-
http://www.aic.gov.au/publications/current%20series/rpp/61-80/rpp78.aspx
-
Broadhurst
R and Choo K-K R forthcoming. Cybercrime and on-line safety in cyberspace. In
Smith C., S. Zhang & R. Barbaret, editors, International Handbook of
Criminology, Routledge: NY.
-
Choo
K-K R and Grabosky P forthcoming. Cyber crime. In Letizia Paoli, editor, Oxford
Handbook of Organized Crime, New York: Oxford University Press.
-
Choo
K-K R 2011. Harnessing information and communications technologies in
community policing, in Judy Putt, editor, Community policing in Australia,
Research and public policy No 111: 67–75, Canberra: Australian Institute of
Criminology.
-
Choo
K-K R 2009. Zombies and Botnets. In Shweta Puneet, editor, Botnets: A Cyber
Threat, ICFAI Press, February.
-
Choo
K-K R and Smith RG 2009. Criminal Exploitation of Online Systems by Organised
Crime Groups, in Yvonne Jewkes, editor, Crime and Media Volume 3:
Emerging New Media and Crime, SAGE Publishing, March.
-
Choo
K-K R 2011. Cyberthreat landscape faced by financial and insurance
industry. Trends & Issues in Crime and Criminal Justice no 408,
Australian Institute of Criminology.
-
http://www.aic.gov.au/publications/current%20series/tandi/401-420/tandi408.aspx
-
Choo
K-K R 2010. High tech criminal threats to the national information infrastructure.
Information Security Technical Report 15(3): 104–111.
-
Choo
K-K R 2010. Cloud computing: Challenges and future directions. Trends
& Issues in Crime and Criminal Justice no 400, Australian Institute of
Criminology. http://www.aic.gov.au/publications/current%20series/tandi/381-400/tandi400.aspx
-
Choo
K-K R 2010. Challenges in dealing with politically exposed persons. Trends
& Issues in Crime and Criminal Justice no 386, Australian Institute of
Criminology. http://www.aic.gov.au/publications/current%20series/tandi/381-400/tandi386.aspx
-
Zeng
P & Choo K-K R & Sun D-Z 2010. On the Security of an Enhanced Novel
Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on
Consumer Electronics 56(2): 566–569, IEEE Press.
-
Wang
S & Cao Z & Cheng Z & Choo K-K R 2009. Perfect forward secure
identity-based authenticated key agreement protocol in the escrow mode. Science
in China Series F: Information Sciences 52(8): 1358–1370.
-
Zeng
P & Cao Z & Choo K-K R & Wang S 2009. Security Weakness in a
Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications
Letters 13(6): 426-428.
-
Zeng
P & Cao Z & Choo K-K R & Wang S 2009. On the Anonymity of Some
Authentication Schemes for Wireless Communications. IEEE Communications Letters
13(3): 170-171.
-
Wang
S & Cao Z & Choo K-K R & Wang L 2009. An Improved Identity-Based
Key Agreement Protocol and Its Security Proof. Information Sciences 179(3):
307–318.
-
Choo
K-K R 2009. Responding to online child sexual grooming: an industry
perspective. Trends & Issues in Crime and Criminal Justice no
379, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/361-380/tandi379.aspx
-
Choo
K-K R 2009. Money laundering and terrorism financing risks of prepaid cards
instruments?. Asian Journal of Criminology 4(1): 11–30.
-
Choo
K-K R 2008. Money laundering risks of prepaid stored value cards. Trends
& Issues in Crime and Criminal Justice no 363, Australian Institute of
Criminology. http://www.aic.gov.au/publications/current%20series/tandi/361-380/tandi363.aspx
-
Choo
K-K R 2008. Organised crime groups in cyberspace: a typology. Trends in
Organized Crime 11(3): 270 – 295.
-
Choo
K-K R and Smith RG 2008. Criminal exploitation of online systems by organised
crime groups. Asian Journal of Criminology 3(1):37-59.
-
Choo
K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. Journal of
Money Laundering Control 10(4): 371–387.
-
Choo
K-K R 2008. Refuting the Security Claims of Mathuria and Jain (2005) Key
Agreement Protocols. International Journal of Network Security 7(1):
15-24.
-
Choo
K-K R 2007. An Integrative Framework to Protocol Analysis and Repair:
Bellare--Rogaway Model + Planning + Model Checker. Informatica 18(4):567-568.
-
Choo
K-K R 2007. A Proof of Revised Yahalom Protocol in the Bellare and Rogaway
(1993) Model. The Computer Journal 50(5): 591-601, Oxford University Press.
Received the Wilkes Award.
-
Choo K-K R, Smith R G and McCusker R 2007*. The future of technology-enabled crime
in Australia. Trends & Issues in Crime and Criminal Justice no
341, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/341-360/tandi341.aspx
-
Choo
K-K R 2007. Zombies and botnets. Trends & Issues in Crime and Criminal
Justice no 333, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/321-340/tandi333.aspx
-
Choo
K-K R 2006. On the Security Analysis of Lee, Hwang, & Lee (2004) and Song
& Kim (2000) Key Exchange / Agreement Protocols. Informatica 17(4):
467-480.
-
Choo
K-K R 2006. Issue Report on Business Adoption of Microsoft Passport.
Information Management & Computer Security 14(3): 218-234.
-
Choo
K-K R & Boyd C & Hitchcock Y 2006. The Importance of Proofs of Security
for Key Establishment Protocols: Formal Analysis of Formal Analysis of
Jan--Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, & Yeh--Sun
Protocols. Computer Communications 29(15): 2788-2797.
-
Choo
K-K R 2006. On the (In) Security of Lee, Kim, Kim, & Oh (2006) Key
Agreement Protocol. International Journal of Network Security 3(1):
85-94.
-
Choo
K-K R 2006. Revisiting Lee, Kim, & Yoo (2005) Authenticated Key Agreement
Protocol. International Journal of Network Security 2(1): 64-68.
-
Choo
K-K R 2006. Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key
Agreement Protocols. International Journal of Network Security 1(3):
154-160.
-
Teo
JCM & Choo K-K R 2010. Security Improvements to Anonymous ID-based Group
Key Agreement for Wireless Network. In proceedings of 7th International
Conference on Information Technology - New Generations (ITNG 2010) (pp. 732 -
737), Las Vegas, Nevada, USA, IEEE Computer Society/CPS (IEEE Conference
Publishing Services), 12 - 14 April.
-
Phan
R C-W, Choo K-K R and Heng S-W 2007. Security of a Leakage-Resilient Protocol
for Key Establishment and Mutual Authentication. In International
Conference on Provable Security - ProvSec 2007, Wollongong, Australia. Vol.
4784/2007 of Lecture Notes in Computer Science (pp. 169-177), Springer-Verlag,
1-2 November.
-
Chow
SSM and Choo K-K R 2007. Strongly-Secure Identity-based Key Agreement and
Anonymous Extension. In Juan Garay, editor, 10th Information Security
Conference 2007 - ISC 2007, Valparaiso, Chile, Volume 4779/2007 of Lecture
Notes in Computer Science (pp. 203 - 220), Springer-Verlag, 9-12 October.
-
Lee
B, Choo K-K R, Yang J and Yoo S 2007. Secret Signatures: How to Achieve
Business Privacy Efficiently?. In Sehun Kim, Moti Yung and Hyung-Woo Lee,
editors, 8th International Workshop on Information Security Applications -
WISA 2007, Jeju Island, Korea, Lecture Notes in Computer Science,
Springer-Verlag, 27-29 August.
-
Choo
K-K R 2006. Refuting Security Proofs for Tripartite Key Exchange with Model
Checker in Planning Problem Setting. In J Guttman (ed) , 19th IEEE
Computer Security Foundations Workshop - CSFW 2006, (pp. 297 - 308),
Venice, Italy, IEEE Computer Society Press, 5-7 July.
-
Boyd
C, Choo K-K R and Mathuria A 2006. An Extension to Bellare and Rogaway (1993)
Model: Resetting Compromised Long-Term Keys. In L Batten & R Safavi-Naini
(eds) , 11th Australasian Conference on Information Security and Privacy -
ACISP 2006 , Melbourne, Australia, Volume 4058/2006 of Lecture Notes in
Computer Science (pp. 371 - 382), Springer-Verlag, 3-5 July.
-
Tang
Q & Choo K-K R 2006. Secure Password-based Authenticated Group Key
Agreement for Data-Sharing Peer-to-Peer Networks. In J Zhou, M Yung, & F
Bao (eds) , 4th International Conference on Applied Cryptography and
Network Security - ACNS 2006 , Singapore, Volume 3989/2006 of Lecture
Notes in Computer Science (pp. 162 - 177), Springer-Verlag, 6-9 June.
-
Ring
J & Choo K-K R & Foo E & Looi M 2006. A New Authentication
Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography.
In A Clark, M McPherson & G Mohay (eds) ,AusCERT Asia Pacific Information
Technology Security Conference (AusCERT2006): Refereed R&D Stream (pp.
57 - 72), Gold Coast, Australia, University of Queensland Publication, 21 - 26
May.
-
Du
R & Foo E & Boyd C & Choo K-K R 2006. Formal Analysis of Secure
Contracting Protocol for E-Tendering. In R Safavi-Naini, C Steketee & W
Susilo (eds) , ACSW Frontiers 2006 - Fourth Australasian Information
Security Workshop (AISW-NetSec 2006), Hobart, Australia, Volume 54 - ACSW
Frontiers 2004 of the ACS Conferences in Research and Practice in Information
Technology (CRPIT) series (pp. 155 - 164), Australian Computer Society, 16 - 19
Jan.
-
Australian
Institute of Criminology 2010. Submission to the Joint Select Committee on
Cyber-Safety. Canberra: Australian Institute of Criminology.
-
Australian
Institute of Criminology 2010. Submission to the Senate Standing Committee On
Legal And Constitutional Affairs Inquiry into the Crimes Legislation Amendment
(Sexual Offences Against Children) Bill 2010 (Cth). Canberra: Australian
Institute of Criminology.
-
Australian
Institute of Criminology 2009. Submission to the House of Representatives
Communications Committee’s Inquiry into Cyber Crime. Canberra: Australian
Institute of Criminology.
Profile Details:
Null