default search action
Christine M. O'Keefe
Person information
- affiliation: CSIRO, Canberra, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j45]Karin Clark, Matt Duckham, Marilys Guillemin, Assunta Hunter, Jodie McVernon, Christine M. O'Keefe, Cathy Pitkin, Steven Prawer, Richard O. Sinnott, Deborah Warr, Jenny Waycott:
Advancing the ethical use of digital data in human research: challenges and strategies to promote ethical practice. Ethics Inf. Technol. 21(1): 59-73 (2019) - [j44]Christine M. O'Keefe, Anne-Sophie Charest:
Bootstrap Differential Privacy. Trans. Data Priv. 12(1): 1-28 (2019) - 2018
- [j43]Mark J. Elliot, Kieron O'Hara, Charles D. Raab, Christine M. O'Keefe, Elaine Mackey, Chris Dibben, Heather Gowans, Kingsley Purdam, Karen McCullagh:
Functional anonymisation: Personal data and the data environment. Comput. Law Secur. Rev. 34(2): 204-221 (2018) - [j42]Christine M. O'Keefe, Adrien Ickowicz, Tim Churches, Mark Westcott, Maree O'Sullivan, Atikur R. Khan:
Assessing privacy risks in population health publications using a checklist-based approach. J. Am. Medical Informatics Assoc. 25(3): 315-320 (2018) - 2017
- [j41]Atikur R. Khan, Christine M. O'Keefe:
Disclosure risk reduction for generalized linear model output in a remote analysis system. Data Knowl. Eng. 111: 90-102 (2017) - [j40]Christine M. O'Keefe, Mark Westcott, Maree O'Sullivan, Adrien Ickowicz, Tim Churches:
Anonymization for outputs of population health and health services research conducted via an online data center. J. Am. Medical Informatics Assoc. 24(3): 544-549 (2017) - [j39]Christine M. O'Keefe, Tim Ayre, Sebastien Lucie, Atikur R. Khan, Soomin Song, Soonmin Kwon:
Perturbed robust linear estimating equations for confidentiality protection in remote analysis. Stat. Comput. 27(3): 775-787 (2017) - 2016
- [j38]Gaurav Singh, Christine M. O'Keefe:
Decentralised scheduling with confidentiality protection. Oper. Res. Lett. 44(4): 514-519 (2016) - 2015
- [j37]Krishnamurty Muralidhar, Christine M. O'Keefe, Rathindra Sarathy:
A Bootstrap Mechanism for Response Masking in Remote Analysis Systems. Decis. Sci. 46(6): 1199-1226 (2015) - 2014
- [j36]Dinusha Vatsalan, Peter Christen, Christine M. O'Keefe, Vassilios S. Verykios:
An Evaluation Framework for Privacy-Preserving Record Linkage. J. Priv. Confidentiality 6(1) (2014) - 2013
- [j35]Bradley A. Malin, Khaled El Emam, Christine M. O'Keefe:
Biomedical data privacy: problems, perspectives, and recent advances. J. Am. Medical Informatics Assoc. 20(1): 2-6 (2013) - [j34]Joo Ho Lee, In Yong Kim, Christine M. O'Keefe:
On Regression-Tree-Based Synthetic Data Methods for Business Data. J. Priv. Confidentiality 5(1) (2013) - 2012
- [j33]Christine M. O'Keefe, Ross Stewart Sparks, Damien McAullay, Bronwyn Loong:
Confidentialising Survival Analysis Output in a Remote Data Access System. J. Priv. Confidentiality 4(1) (2012) - [j32]Christine M. O'Keefe, Natalie Shlomo:
Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data. Trans. Data Priv. 5(2): 403-432 (2012) - 2010
- [j31]Jie Chen, Huidong Jin, Hongxing He, Damien McAullay, Christine M. O'Keefe, Ross Sparks, Chris Kelman:
Mining consequence events in temporal health data. Intell. Data Anal. 14(2): 245-261 (2010) - [j30]Huidong Jin, Jie Chen, Hongxing He, Chris Kelman, Damien McAullay, Christine M. O'Keefe:
Signaling Potential Adverse Drug Reactions from Administrative Health Databases. IEEE Trans. Knowl. Data Eng. 22(6): 839-853 (2010) - 2009
- [j29]Christine M. O'Keefe, Norm M. Good:
Regression output from a remote analysis server. Data Knowl. Eng. 68(11): 1175-1186 (2009) - 2008
- [j28]Ross Sparks, Chris Carter, John B. Donnelly, Christine M. O'Keefe, Jodie Duncan, Tim Keighley, Damien McAullay:
Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics®. Comput. Methods Programs Biomed. 91(3): 208-222 (2008) - [j27]Huidong Jin, Jie Chen, Hongxing He, Graham J. Williams, Chris Kelman, Christine M. O'Keefe:
Mining Unexpected Temporal Associations: Applications in Detecting Adverse Drug Reactions. IEEE Trans. Inf. Technol. Biomed. 12(4): 488-500 (2008) - 2006
- [j26]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal updating of ideal threshold schemes. Australas. J Comb. 36: 123-132 (2006) - 2005
- [j25]Christine M. O'Keefe, Paul Greenfield, Andrew Goodchild:
A Decentralised Approach to Electronic Consent and Health Information Access Control. J. Res. Pract. Inf. Technol. 37(2) (2005) - 2004
- [j24]Matthew R. Brown, Christine M. O'Keefe, Stanley E. Payne, Tim Penttila, Gordon F. Royle:
Spreads of T2(o), alpha-flocks and Ovals. Des. Codes Cryptogr. 31(3): 251-282 (2004) - 2003
- [j23]Mida Guillermo, Keith M. Martin, Christine M. O'Keefe:
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. Des. Codes Cryptogr. 28(3): 227-245 (2003) - 2002
- [j22]Christine M. O'Keefe, Tim Penttila:
Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph). Eur. J. Comb. 23(2): 213-232 (2002) - 2001
- [j21]Christine M. O'Keefe, Tim Penttila:
Subquadrangles of Generalized Quadrangles of Order (q2, q), q Even. J. Comb. Theory A 94(2): 218-229 (2001) - 2000
- [j20]Frank De Clerck, Nicholas A. Hamilton, Christine M. O'Keefe, Tim Penttila:
Quasi-quadrics and related structures. Australas. J Comb. 22: 151-166 (2000) - 1999
- [j19]Simeon Ball, Aart Blokhuis, Christine M. O'Keefe:
On Unitals with Many Baer Sublines. Des. Codes Cryptogr. 17(1-3): 237-252 (1999) - [j18]Matthew R. Brown, Christine M. O'Keefe, Tim Penttila:
Triads, Flocks of Conics and Q. Des. Codes Cryptogr. 18(1/3): 63-70 (1999) - [j17]Aart Blokhuis, Christine M. O'Keefe:
On deriving unitals. Discret. Math. 197-198: 137-141 (1999) - 1997
- [j16]Christine M. O'Keefe, Tim Penttila:
Ovals in Translation Hyperovals and Ovoids. Eur. J. Comb. 18(6): 667-683 (1997) - [j15]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes. J. Cryptol. 10(4): 261-289 (1997) - 1996
- [j14]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
A Construction for Multisecret Threshold Schemes. Des. Codes Cryptogr. 9(3): 287-303 (1996) - [j13]Christine M. O'Keefe:
Ovoids in PG(3, q): a survey. Discret. Math. 151(1-3): 175-188 (1996) - [j12]Christine M. O'Keefe, Arlene A. Pascasio:
Images of conics under derivation. Discret. Math. 151(1-3): 189-199 (1996) - [j11]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Ideal Secret Sharing Schemes with Multiple Secrets. J. Cryptol. 9(4): 233-250 (1996) - 1995
- [j10]Christine M. O'Keefe:
Key Distribution Patterns Using Minkowski Planes. Des. Codes Cryptogr. 5(3): 261-267 (1995) - [j9]Christine M. O'Keefe, Joseph A. Thas:
Ovoids of the quadric Q(2n, q). Eur. J. Comb. 16(1): 87-92 (1995) - 1994
- [j8]Christine M. O'Keefe, Tim Penttila:
Symmetries of Arcs. J. Comb. Theory A 66(1): 53-67 (1994) - 1993
- [j7]Christine M. O'Keefe:
Applications of finite geometries to information security. Australas. J Comb. 7: 195-212 (1993) - [j6]Christine M. O'Keefe, Alan Rahilly:
Spreads and Group Divisible Designs. Des. Codes Cryptogr. 3(3): 229-235 (1993) - [j5]Christine M. O'Keefe, Tim Penttila, Cheryl E. Praeger:
Block-transitive, point-imprimitive designs with lambda = 1. Discret. Math. 115(1-3): 231-244 (1993) - 1992
- [j4]Werner Nickel, Alice C. Niemeyer, Christine M. O'Keefe, Tim Penttila, Cheryl E. Praeger:
The Block-Transitive, Point-Imprimitive 2-(729, 8, 1) Designs. Appl. Algebra Eng. Commun. Comput. 3: 47-61 (1992) - [j3]Christine M. O'Keefe, Arlene A. Pascasio, Tim Penttila:
Hyperovals in Hall planes. Eur. J. Comb. 13(3): 195-199 (1992) - 1991
- [j2]Christine M. O'Keefe, Tim Penttila:
Hyperovals in PG(2, 16). Eur. J. Comb. 12(1): 51-59 (1991) - 1990
- [j1]Christine M. O'Keefe:
Ovals in Desarguesian planes. Australas. J Comb. 1: 149-160 (1990)
Conference and Workshop Papers
- 2018
- [c17]Christine M. O'Keefe:
Digital High-Resolution Melt Platform for Rapid and Parallelized Molecule-by-Molecule Genetic Profiling. EMBC 2018: 5342-5345 - 2014
- [c16]Christine M. O'Keefe:
Privacy and Confidentiality in Service Science and Big Data Analytics. Privacy and Identity Management 2014: 54-70 - [c15]Christine M. O'Keefe, Phillip Gould, Tim Churches:
Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia. Privacy in Statistical Databases 2014: 299-311 - [c14]Christine M. O'Keefe, Natalie Shlomo:
Applicability of Confidentiality Methods to Personal and Business Data. Privacy in Statistical Databases 2014: 350-363 - 2012
- [c13]Christine M. O'Keefe:
Confidentialising Maps of Mixed Point and Diffuse Spatial Data. Privacy in Statistical Databases 2012: 226-240 - 2011
- [c12]Joo-Ho Lee, In-Yong Kim, Christine M. O'Keefe:
Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data. ICDM Workshops 2011: 651-658 - 2008
- [c11]Christine M. O'Keefe, Norm M. Good:
A Remote Analysis Server - What Does Regression Output Look Like?. Privacy in Statistical Databases 2008: 270-283 - 2007
- [c10]Huidong Jin, Jie Chen, Hongxing He, Christine M. O'Keefe:
Privacy-Preserving Sequential Pattern Release. PAKDD 2007: 547-554 - 2006
- [c9]Kerry L. Taylor, Christine M. O'Keefe, John Colton, Rohan A. Baxter, Ross Sparks, Mark A. Cameron, Laurent Lefort, Uma Srinivasan:
A Data Network for Health e-Research. ECEH 2006: 215-226 - [c8]Huidong Jin, Jie Chen, Chris Kelman, Hongxing He, Damien McAullay, Christine M. O'Keefe:
Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases. PAKDD 2006: 867-876 - 2004
- [c7]Kerry L. Taylor, Christine M. O'Keefe, John Colton, Rohan A. Baxter, Ross Sparks, Uma Srinivasan, Mark A. Cameron, Laurent Lefort:
A Service Oriented Architecture for a Health Research Data Network. SSDBM 2004: 443-444 - [c6]Christine M. O'Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter:
Privacy-preserving data linkage protocols. WPES 2004: 94-102 - 2003
- [c5]Christine M. O'Keefe, Paul Greenfield:
Role and Expression of Consent in Web Services. ICWS 2003: 382-388 - 1995
- [c4]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). EUROCRYPT 1995: 183-193 - 1994
- [c3]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract). ASIACRYPT 1994: 42-54 - 1993
- [c2]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Multisecret Threshold Schemes. CRYPTO 1993: 126-135 - 1992
- [c1]Christine M. O'Keefe:
A Comparison of Key Distribution Patterns Constructed from Circle Geometries. AUSCRYPT 1992: 517-527
Reference Works
- 2018
- [r2]David P. Hansen, Christine M. O'Keefe:
Data Privacy and Patient Consent. Encyclopedia of Database Systems (2nd ed.) 2018 - 2009
- [r1]David P. Hansen, Christine M. O'Keefe:
Data Privacy and Patient Consent. Encyclopedia of Database Systems 2009: 600-604
Informal and Other Publications
- 2004
- [i1]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal Updating of Ideal Threshold Schemes. IACR Cryptol. ePrint Arch. 2004: 178 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint