Biography

Dr. Kim-Kwang Raymond Choo

University of South Australia and Australian National University, Australia


Email: raymond.choo.au@gmail.com


Qualifications

2006  Ph.D., Information Security Institute Queensland University of Technology


Publications (Selected)

  1. Choo K-K R 2009. Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Research and public policy No 103, Australian Institute of Criminology.
  2. Choo K-K R 2008. Secure Key Establishment. Advances in Information Security Book series Volume 41. Springer Science+Business Media, LLC.
  3. Urbas G and Choo K-K R 2008. Resource materials on technology-enabled crime. Technical and background paper No 28, Australian Institute of Criminology.
  4. Choo K-K R, Smith R G and McCusker R 2007. Future directions in technology-enabled crime : 2007-2009. Research and public policy No 78, Australian Institute of Criminology.
  5. http://www.aic.gov.au/publications/current%20series/rpp/61-80/rpp78.aspx
  6. Broadhurst R and Choo K-K R forthcoming. Cybercrime and on-line safety in cyberspace. In Smith C., S. Zhang & R. Barbaret, editors, International Handbook of Criminology, Routledge: NY.
  7. Choo K-K R and Grabosky P forthcoming. Cyber crime. In Letizia Paoli, editor, Oxford Handbook of Organized Crime, New York: Oxford University Press.
  8. Choo K-K R 2011. Harnessing information and communications technologies in community policing, in Judy Putt, editor, Community policing in Australia, Research and public policy No 111: 67–75, Canberra: Australian Institute of Criminology.
  9. Choo K-K R 2009. Zombies and Botnets. In Shweta Puneet, editor, Botnets: A Cyber Threat, ICFAI Press, February.
  10. Choo K-K R and Smith RG 2009. Criminal Exploitation of Online Systems by Organised Crime Groups, in Yvonne Jewkes, editor, Crime and Media Volume 3: Emerging New Media and Crime, SAGE Publishing, March.
  11. Choo K-K R 2011. Cyberthreat landscape faced by financial and insurance industry. Trends & Issues in Crime and Criminal Justice no 408, Australian Institute of Criminology.
  12. http://www.aic.gov.au/publications/current%20series/tandi/401-420/tandi408.aspx
  13. Choo K-K R 2010. High tech criminal threats to the national information infrastructure. Information Security Technical Report 15(3): 104–111.
  14. Choo K-K R 2010. Cloud computing: Challenges and future directions. Trends & Issues in Crime and Criminal Justice no 400, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/381-400/tandi400.aspx
  15. Choo K-K R 2010. Challenges in dealing with politically exposed persons. Trends & Issues in Crime and Criminal Justice no 386, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/381-400/tandi386.aspx
  16. Zeng P & Choo K-K R & Sun D-Z 2010. On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2): 566–569, IEEE Press.
  17. Wang S & Cao Z & Cheng Z & Choo K-K R 2009. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science in China Series F: Information Sciences 52(8): 1358–1370.
  18. Zeng P & Cao Z & Choo K-K R & Wang S 2009. Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6): 426-428.
  19. Zeng P & Cao Z & Choo K-K R & Wang S 2009. On the Anonymity of Some Authentication Schemes for Wireless Communications. IEEE Communications Letters 13(3): 170-171.
  20. Wang S & Cao Z & Choo K-K R & Wang L 2009. An Improved Identity-Based Key Agreement Protocol and Its Security Proof. Information Sciences 179(3): 307–318.
  21. Choo K-K R 2009. Responding to online child sexual grooming: an industry perspective. Trends & Issues in Crime and Criminal Justice no 379, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/361-380/tandi379.aspx
  22. Choo K-K R 2009. Money laundering and terrorism financing risks of prepaid cards instruments?. Asian Journal of Criminology 4(1): 11–30.
  23. Choo K-K R 2008. Money laundering risks of prepaid stored value cards. Trends & Issues in Crime and Criminal Justice no 363, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/361-380/tandi363.aspx
  24. Choo K-K R 2008. Organised crime groups in cyberspace: a typology. Trends in Organized Crime 11(3): 270 – 295.
  25. Choo K-K R and Smith RG 2008. Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology 3(1):37-59.
  26. Choo K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. Journal of Money Laundering Control 10(4): 371–387.
  27. Choo K-K R 2008. Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. International Journal of Network Security 7(1): 15-24.
  28. Choo K-K R 2007. An Integrative Framework to Protocol Analysis and Repair: Bellare--Rogaway Model + Planning + Model Checker. Informatica 18(4):567-568.
  29. Choo K-K R 2007. A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal 50(5): 591-601, Oxford University Press. Received the Wilkes Award.
  30. Choo K-K R, Smith R G and McCusker R 2007*. The future of technology-enabled crime in Australia. Trends & Issues in Crime and Criminal Justice no 341, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/341-360/tandi341.aspx
  31. Choo K-K R 2007. Zombies and botnets. Trends & Issues in Crime and Criminal Justice no 333, Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/tandi/321-340/tandi333.aspx
  32. Choo K-K R 2006. On the Security Analysis of Lee, Hwang, & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. Informatica 17(4): 467-480.
  33. Choo K-K R 2006. Issue Report on Business Adoption of Microsoft Passport. Information Management & Computer Security 14(3): 218-234.
  34. Choo K-K R & Boyd C & Hitchcock Y 2006. The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Formal Analysis of Jan--Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, & Yeh--Sun Protocols. Computer Communications 29(15): 2788-2797.
  35. Choo K-K R 2006. On the (In) Security of Lee, Kim, Kim, & Oh (2006) Key Agreement Protocol. International Journal of Network Security 3(1): 85-94.
  36. Choo K-K R 2006. Revisiting Lee, Kim, & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security 2(1): 64-68.
  37. Choo K-K R 2006. Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security 1(3): 154-160.
  38. Teo JCM & Choo K-K R 2010. Security Improvements to Anonymous ID-based Group Key Agreement for Wireless Network. In proceedings of 7th International Conference on Information Technology - New Generations (ITNG 2010) (pp. 732 - 737), Las Vegas, Nevada, USA, IEEE Computer Society/CPS (IEEE Conference Publishing Services), 12 - 14 April.
  39. Phan R C-W, Choo K-K R and Heng S-W 2007. Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. In International Conference on Provable Security - ProvSec 2007, Wollongong, Australia. Vol. 4784/2007 of Lecture Notes in Computer Science (pp. 169-177), Springer-Verlag, 1-2 November.
  40. Chow SSM and Choo K-K R 2007. Strongly-Secure Identity-based Key Agreement and Anonymous Extension. In Juan Garay, editor, 10th Information Security Conference 2007 - ISC 2007, Valparaiso, Chile, Volume 4779/2007 of Lecture Notes in Computer Science (pp. 203 - 220), Springer-Verlag, 9-12 October.
  41. Lee B, Choo K-K R, Yang J and Yoo S 2007. Secret Signatures: How to Achieve Business Privacy Efficiently?. In Sehun Kim, Moti Yung and Hyung-Woo Lee, editors, 8th International Workshop on Information Security Applications - WISA 2007, Jeju Island, Korea, Lecture Notes in Computer Science, Springer-Verlag, 27-29 August.
  42. Choo K-K R 2006. Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. In J Guttman (ed) , 19th IEEE Computer Security Foundations Workshop - CSFW 2006, (pp. 297 - 308), Venice, Italy, IEEE Computer Society Press, 5-7 July.
  43. Boyd C, Choo K-K R and Mathuria A 2006. An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. In L Batten & R Safavi-Naini (eds) , 11th Australasian Conference on Information Security and Privacy - ACISP 2006 , Melbourne, Australia, Volume 4058/2006 of Lecture Notes in Computer Science (pp. 371 - 382), Springer-Verlag, 3-5 July.
  44. Tang Q & Choo K-K R 2006. Secure Password-based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. In J Zhou, M Yung, & F Bao (eds) , 4th International Conference on Applied Cryptography and Network Security - ACNS 2006 , Singapore, Volume 3989/2006 of Lecture Notes in Computer Science (pp. 162 - 177), Springer-Verlag, 6-9 June.
  45. Ring J & Choo K-K R & Foo E & Looi M 2006. A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography. In A Clark, M McPherson & G Mohay (eds) ,AusCERT Asia Pacific Information Technology Security Conference (AusCERT2006): Refereed R&D Stream (pp. 57 - 72), Gold Coast, Australia, University of Queensland Publication, 21 - 26 May.
  46. Du R & Foo E & Boyd C & Choo K-K R 2006. Formal Analysis of Secure Contracting Protocol for E-Tendering. In R Safavi-Naini, C Steketee & W Susilo (eds) , ACSW Frontiers 2006 - Fourth Australasian Information Security Workshop (AISW-NetSec 2006), Hobart, Australia, Volume 54 - ACSW Frontiers 2004 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series (pp. 155 - 164), Australian Computer Society, 16 - 19 Jan.
  47. Australian Institute of Criminology 2010. Submission to the Joint Select Committee on Cyber-Safety. Canberra: Australian Institute of Criminology.
  48. Australian Institute of Criminology 2010. Submission to the Senate Standing Committee On Legal And Constitutional Affairs Inquiry into the Crimes Legislation Amendment (Sexual Offences Against Children) Bill 2010 (Cth). Canberra: Australian Institute of Criminology.
  49. Australian Institute of Criminology 2009. Submission to the House of Representatives Communications Committee’s Inquiry into Cyber Crime. Canberra: Australian Institute of Criminology.



Profile Details:

Null

Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top