| 2008 |
| 34 | EE | Dennis Longley,
Mark Branagan,
William J. Caelli,
Lam-for Kwok:
Feasibility of Automated Information Security Compliance Auditing.
SEC 2008: 493-508 |
| 2007 |
| 33 | EE | William J. Caelli:
Application Security - Myth Or Reality?
ISPEC 2007: 1-10 |
| 32 | EE | William J. Caelli:
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM.
SEC 2007: 433-442 |
| 2006 |
| 31 | EE | John W. Holford,
William J. Caelli:
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.
ACISP 2006: 183-194 |
| 2005 |
| 30 | EE | Adrian McCullagh,
William J. Caelli:
Who Goes There? Internet Banking: A Matter of Risk and Reward.
ACISP 2005: 336-357 |
| 29 | EE | Jason Reid,
William J. Caelli:
DRM, Trusted Computing and Operating System Architecture.
ACSW Frontiers 2005: 127-136 |
| 2004 |
| 28 | EE | Vicky Liu,
William J. Caelli,
Ernest Foo,
Selwyn Russell:
Visually Sealed and Digitally Signed Documents.
ACSC 2004: 287-294 |
| 27 | EE | John W. Holford,
William J. Caelli,
Anthony W. Rhodes:
Using Self-Defending Objects to Develop Security Aware Applications in Java.
ACSC 2004: 341-349 |
| 2002 |
| 26 | | William J. Caelli:
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security.
Computers & Security 21(5): 413-420 (2002) |
| 2001 |
| 25 | | K. M. Ang,
William J. Caelli:
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
SEC 2001: 19-34 |
| 24 | EE | Adrian McCullagh,
William J. Caelli,
Peter Little:
Signature Stripping: A Digital Dilemma.
Journal of Information, Law and Technology 2001(1): (2001) |
| 2000 |
| 23 | EE | Adrian McCullagh,
William J. Caelli:
Non-Repudiation in the Digital Environment.
First Monday 5(8): (2000) |
| 1999 |
| 22 | | William J. Caelli:
A Secure Electronic Commerce Environment: Only with `Smart Cards'.
Conference on Information Security Management & Small Systems Security 1999: 231-242 |
| 21 | EE | William J. Caelli,
Ed Dawson,
Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures.
Computers & Security 18(1): 47-66 (1999) |
| 1998 |
| 20 | | William J. Caelli,
Vincent Cordonnier,
Anthony Watson:
A Data Driven Model for Designing Applications with Smart Cards.
CARDIS 1998: 313-325 |
| 1997 |
| 19 | | Ernest Foo,
Colin Boyd,
William J. Caelli,
Ed Dawson:
A taxonomy of electronic cash schemes.
SEC 1997: 337-348 |
| 1995 |
| 18 | | William J. Caelli:
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?
Cryptography: Policy and Algorithms 1995: 1-19 |
| 17 | | George M. Mohay,
Hasmukh Morarji,
Q. Le Viet,
Lance Munday,
William J. Caelli:
The CASS Shell.
Cryptography: Policy and Algorithms 1995: 313-325 |
| 16 | | William J. Caelli:
Commercial Key Escrow: An Australian Perspective.
Cryptography: Policy and Algorithms 1995: 40-64 |
| 1994 |
| 15 | EE | Mark Looi,
William J. Caelli:
A note on supplying a trusted clock via a secure device.
Computers & Security 13(7): 611-613 (1994) |
| 14 | EE | Helen Gustafson,
Edward P. Dawson,
Lauren Nielsen,
William J. Caelli:
A computer package for measuring the strength of encryption algorithms.
Computers & Security 13(8): 687-697 (1994) |
| 13 | EE | William J. Caelli:
Security in Open and Distributed Systems.
Inf. Manag. Comput. Security 2(1): 18-24 (1994) |
| 1993 |
| 12 | EE | William J. Caelli,
Ian G. Graham,
Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs).
Computers & Security 12(7): 640-645 (1993) |
| 11 | EE | Rossouw von Solms,
Sebastiaan H. von Solms,
William J. Caelli:
A Model for Information Security Management.
Inf. Manag. Comput. Security 1(3): (1993) |
| 1992 |
| 10 | | Guy G. Gable,
William J. Caelli:
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992
North-Holland 1992 |
| 9 | | Helen Gustafson,
Ed Dawson,
Lauren Nielsen,
William J. Caelli:
Measuring the Strength of Ciphers.
SEC 1992: 235-247 |
| 8 | | William J. Caelli,
Dennis Longley,
Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures.
SEC 1992: 277-296 |
| 7 | EE | William J. Caelli,
Anthony W. Rhodes,
N. C. Russell:
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC.
Computers & Security 11(5): 463-479 (1992) |
| 1990 |
| 6 | | Helen Gustafson,
Ed Dawson,
William J. Caelli:
Comparison of Block Ciphers.
AUSCRYPT 1990: 208-220 |
| 5 | | William J. Caelli,
David Edmond,
E. A. Knight,
Alan B. Tickle:
Implications of the tax file number legislation for computer professionals.
Australian Computer Journal 22(1): 11-20 (1990) |
| 1988 |
| 4 | | William J. Caelli:
Electronic Funds Transfer Systems.
Australian Computer Journal 20(4): 168-169 (1988) |
| 1987 |
| 3 | | William J. Caelli:
Guidelines for Privacy and Security in Computer Systems.
Australian Computer Journal 19(4): 203-205 (1987) |
| 1985 |
| 2 | | William J. Caelli:
Privacy and security in Office Automation Systems.
Australian Computer Journal 17(3): 126-130 (1985) |
| 1979 |
| 1 | | William J. Caelli:
The CODASYL 1978 Data Base Proposals: An Overview and Discussion.
Australian Computer Journal 11(2): 48-59 (1979) |