Vita

Clark David Thomborson
(a.k.a. Clark Thompson)
Department of Computer Science
The University of Auckland
Private Bag 92019
Auckland, New Zealand
phone: +64 9 373 7599 ext 85753
fax: +64 9 373 7453
email: cthombor@cs.auckland.ac.nz
http://www.cs.auckland.ac.nz/~cthombor
Last modified: 8 December 2016

Education:

Professional Memberships and Recognition:

Work Experience:

Consultancies (partial listing):

Articles in Refereed Journals:

  1. An Experiment on the Impact of Transparency on the Effectiveness of Requirements Documents, by Yu-Cheng Tu, Ewan Tempero, and Clark Thomborson, Empirical Software Engineering 21:3 1035-1066, June 2016.
  2. Multimedia Applications and Security in MapReduce: Opportunities and Challenges, by Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian, and Athanasios Vasilikos, Concurrency and Computation: Practice and Experience 24:17, 2083-2101, 2012.
  3. A Novel Watermarking Method for Software Protection in the Cloud, by Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian, and Athanasios Vasilikos, Software: Practice and Experience 42:4 409-430, Wiley, 2012.
  4. Dynamic graph-based software fingerprinting, by Christian S. Collberg, Clark Thomborson, and Gregg M. Townsend, ACM TOPLAS 29(6) 35:1-67, October 2007.
  5. Recent software protection techniques - Hardware-assisted tamper prevention (in Japanese), by Akito Monden and Clark Thomborson, IPSJ Magazine 46:5, Information Processing Society of Japan, pp. 558 - 563, May 2005.
  6. Recent software protection techniques - Software-only tamper prevention (in Japanese), by Akito Monden and Clark Thomborson, IPSJ Magazine 46:4, Information Processing Society of Japan, pp. 431 - 437, April 2005.
  7. Tamper-resistant software system based on a finite state machine, by Akito Monden, Antoine Monsifrot, and Clark Thomborson, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol.E88-A, No.1, pp. 112-122, 1 January 2005.
  8. Watermarking, tamper-proofing, and obfuscation - Tools for software protection, by Christian Collberg and Clark Thomborson, IEEE Transactions on Software Engineering 28:8, 735-746, August 2002. DOI: 10.1109/TSE.2002.1027797.
  9. The economics of large-memory computations, by Clark Thomborson, Information Processing Letters 66, 263-268, 1998.
  10. Optimized carry lookahead adders with direct feeding, by Marek J. Patyra, Yi Sun, and Clark Thomborson, Microelectronics and Reliability 36: 2, 121-132, 2 February 1996.
  11. A probably fast, provably optimal algorithm for rectilinear Steiner trees, by Linda L. Deneen, Gary M. Shute, and Clark Thomborson, Random Structures & Algorithms 5:4, pp. 535-557, 1994.
  12. Does your workstation computation belong on a vector supercomputer?, by Clark D. Thomborson, C. ACM 36:11, pp. 41-49 and 94, November 1993.
  13. The V.42bis standard for data-compressing modems, by Clark Thomborson, IEEE Micro 12:5, 41-53, October 1992.
  14. Delay optimization of carry-skip adders and block carry-lookahead adders, by Pak K. Chan, Martine D.F. Schlag, Clark D. Thomborson, and Vojin G. Oklobdzija, IEEE Trans. Computers 41: 8, 920-930, August 1992. DOI: 10.1109/12.156534.
  15. An O(n log n) plane-sweep algorithm for L1 and L¥ Delauney Triangulations, by Gary M. Shute, Linda L. Deneen and Clark D. Thomborson, Algorithmica 6, 207-221, 1991.
  16. Multiterminal global routing: a deterministic approximation scheme, by Prabhakar Raghavan and Clark Thompson, Algorithmica 6, 73-82, 1991.
  17. Area-time optimal adder design, by Belle W.Y. Wei and Clark D. Thompson, IEEE Trans. Computers 39:5, 666-675, May 1990. DOI: 10.1109/12.53579.
  18. Randomized rounding: a technique for provably good algorithms and algorithmic proofs, by Prabhakar Raghavan and Clark Thompson, Combinatorica 7:4, 365-374, 1987.
  19. Experimental results for a linear-program global router, by Antony P-C Ng, Prabhakar Raghavan, and Clark D. Thompson, Computers and Artificial Intelligence 6:3, 229-242, 1987.
  20. Global wire routing in two-dimensional arrays, by R.M. Karp, F.T. Leighton, R. Rivest, C. Thompson, V.V. Vazirani, and U.V. Vazirani, Algorithmica, 113-130, February 1987.
  21. A minimum-area circuit for l-selection, by Pavol Duris, Ondrej Sýkora, Clark Thompson, and Imrich Vrto, Algorithmica, January 1987.
  22. Military direction of academic CS research, by Clark Thompson, Communications of the ACM 29:7, 583-585, July 1986.
  23. Military control of over half of computer science research is excessive, by Clark Thompson, Computers and People 35:3-4, 25-27, March-April 1986.
  24. Tight chip area bounds for sorting, by Pavol Duris, Ondrej Sýkora, Clark Thompson, and Imrich Vrto, Computers and Artificial Intelligence 4:6, 535-544, December 1985.
  25. Tight chip area lower bounds for discrete Fourier and Walsh-Hadamard Transformations, by Pavol Duris, Ondrej Sýkora, Clark Thompson, and Imrich Vrto, Information Processing Letters 21, 245-247, 18 November 1985.
  26. VLSI design with multiple active layers, Information Processing Letters 21, 109-111, 5 September 1985.
  27. The VLSI complexity of sorting (Japanese translation), Information Processing Society Journal 26:6, 640-651, June 1985.
  28. An efficient implementation of search trees on \ceiling{log n + 1} processors, by Michael J. Carey and Clark D. Thompson, IEEE Trans. Computers C-33:11, 1038-1041, November 1984. DOI: 10.1109/TC.1984.1676379.
  29. The VLSI complexity of sorting, IEEE Trans. Computers C-32:12, 1171-1184, December 1983. DOI: 10.1109/TC.1983.1676178.
  30. Fourier transforms in VLSI, IEEE Trans. Computers C-32:11, 1047-1057, November 1983. DOI: 10.1109/TC.1983.1676155.
  31. Generalized connection networks for parallel processor intercommunication, IEEE Trans. Computers C-27:12, 1119-1125, December 1978. DOI: 10.1109/TC.1978.1675014.
  32. On the average number of maxima in a set of vectors and applications, by J. L. Bentley, H. T. Kung, M. Schkolnick, and C. D. Thompson, J. ACM 25:4, 536-543, October 1978. DOI: 10.1145/322092.322095.
  33. Sorting on a mesh-connected parallel computer, by C. D. Thompson and H. T. Kung, C. ACM 20:4, 263-271, April 1977. DOI: 10.1145/359461.359481

Patents and Published Patent Applications:

  1. Code obfuscation technique for software security. Japanese patent 4739465, published 13 May 2011, by Christian Collberg, Clark Thomborson and Douglas Low. Assigned to InterTrust.
  2. Method of introducing digital signature into software, NZ Patent 533028, by Clark Thomborson and Jasvir Nagra, assigned to Auckland Uniservices Ltd, granted 12 January 2006. Also published as US Patent Application 2005/0262490A1, 23 pp., 22 claims, filed 19 May 2005, published 24 November 2005; Canada (CA2507361); and Australia (AU5202102).
  3. Tamper-proofing watermarked computer programs, US Patent Application 2005/0050396A1, by Clark Thomborson, Yong He, Ram Somaraju, and Jasvir Nagra, assigned to Auckland UniServices Ltd, 14 pp., 13 claims, filed 20 May 2004, published 3 March 2005.
  4. Transaction system and method, US Patent Application 2004/0093310, by Clark Thomborson, assigned to Auckland UniServices Ltd, 17 pp., 19 claims, filed 24 September 2003, published 13 May 2004. New Zealand patent application 521555. Abandoned in 2007 after discovering prior art in US 6856977, Method and system for proving ownership of digital data, by Adelsbach, Pfitzmann, Sadeghi.
  5. Obfuscation techniques for enhancing software security, by Christian Collberg, Clark Thomborson and Douglas Low, US Patent 6,668,325, assigned to InterTrust Inc of Sunnyvale CA (USA), filed 9 June 1998, issued 23 December 2003. See also WO 99/01815A1, EP0988591A1, CA2293650AA, AU7957998A1, JP2002514333T2, CN1260055T.
  6. Software watermarking techniques, published international patent application WO 99/64973, by Christian Collberg and Clark Thomborson, assigned to Auckland UniServices Ltd, 16 December 1999. See also AU4535699A1, and US 2011/021418 (filed 15 November 2010, published 1 September 2011).

Articles in Conference Proceedings:

  1. Privacy Patterns, by Clark Thomborson, to appear in the proceedings of PST 2016, Auckland (NZ), 13 December 2016. A preliminary version is available as arXiv:1612.01553, 5 December 2016.
  2. Pinpointing and Hiding Surprising Fragments in an Obfuscated Program, by Yuichiro Kanzaki, Clark Thomborson, Akito Monden, and Christian Collberg, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, affiliated with ACSAC 2015, Los Angeles, CA (USA), 8 December 2015. Author's preprint.
  3. Evaluating Presentation of Requirements Documents: Results of an Experiment, by Yu-Cheng Tu, Ewan Tempero, and Clark Thomborson, CCIS Vol. 432 (First Asia Pacific Requirements Engineering Symposium, Auckland, 28-29 April 2014), Springer, pp. 120-134, 2014.
  4. The Dhammic Framework for Understanding the Cause of System Project Failures from Buddhist Insights, by Pita Jarupunphol and Clark Thomborson, to appear in Proc. 12th IEEE International Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC 2013, New York City, 16-18 July 2013).
  5. The Art and Science of Obfuscation, in Information Systems, Technology and Management (ICISTM 2012, Grenoble, 28-30 March 2012), Springer CCIS 285:9, 445-450, 2012.
  6. A Cloud-Based Watermarking Method for Health Data Security, by Zhiwei Yu, Clark Thomborson, Chaokun Wang, Jianmin Wang, and Rui Li, in Proc. International Conference on High Performance Computing & Simulation (HPCS 2012), pp. 642-647, 2012. The only recipient of an Outstanding Poster Paper Award. Award certificate. Award.
  7. Illusions and Perceptions of Transparency in Software Engineering, by Yu-Cheng Tu, Clark Thomborson, Ewan Tempero, in The 18th Asia-Pacific Software Engineering Conference (APSEC 2011, 5-8 December 2011, Ho Chi Minh City), 365-372, 2011.
  8. Axiomatic and Behavioural Trust, by Clark Thomborson, in Trust and Trustworthy Computing (Trust 2010, 21-23 June 2010, Berlin, Germany), LNCS 6101, Springer, 2010.
  9. A security model for VoIP Steganography, by Zhiwei Yu, Clark Thomborson, Chaokun Wang, Junning Fu, and Jianmin Wang, in Proc. of the First International Conference on Multimedia Information Networking and Security (MINES 2009, Wuhan, Hubei, China, 17-20 November 2009), pp. 35-40.
  10. A semi-dynamic multiple watermarking scheme for Java applications, by Changjiang Zhang, Jianmin Wang, Clark Thomborson, Chaokun Wang, and Christian Collberg, in Proc. of the 9th ACM Workshop on Digital Rights Management (DRM 2009, Chicago IL, USA, 9 November 2009), pp. 59-72.
  11. Preliminary Security Specification for New Zealand's igovt System, by Yu-Cheng Tu and Clark Thomborson, in Information Security 2009 (Proc. 7th AISC, Wellington, January 2009), CRPIT vol. 98, pp. 79-88, 2009. Press coverage: Researcher questions government security analysis, by Stephen Bell, ComputerWorld, 16 Feb 2009.
  12. Passwords and Perceptions, by Gilbert Notoatmodjo and Clark Thomborson, Information Security 2009 (Proc. 7th AISC, Wellington, January 2009), CRPIT vol. 98, pp. 71-78, 2009.
  13. A Model for New Zealand's Identity Verification Service, by Clark Thomborson, in Trusted Computing - Challenges and Applications (Proc. TRUST 2008, Villach, Austria, 12 March 2008), LNCS 4968, 2008. Presentation slides.
  14. Slicing obfuscations: Design, correctness, and evaluation, by Anirban Majumdar, Stephen Drape, and Clark Thomborson, in Proceedings of the 2007 ACM Workshop on Digital Rights Management (DRM '07, Alexandria VA USA, 29 October 2007), pp. 70-81, 2007.
  15. Specifying imperative data obfuscations, by Stephen Drape, Clark Thomborson, and Anirban Majumdar, in Information Security (Proc. 10th ISC2007, Valparaiso, Chile, 9-12 October 2007), LNCS Vol. 4779, Springer, pp. 299-314, 2007. Acceptance rate: 29/116.
  16. Metrics-based evaluation of slicing obfuscations, by Anirban Majumdar, Stephen Drape, and Clark Thomborson, in The Third International Symposium on Information Assurance and Security (Proc. IAS 2007, Manchester, UK, 29-31 August 2007), pp. 472-477, 2007.
  17. Slicing aided design of obfuscating transforms, by Stephen Drape, Anirban Majumdar, and Clark Thomborson, in 6th IEEE/ACIS International Conference on Computer and Information Science (Proc. ICIS 2007, Melbourne, 11-13 July 2007), pp. 1019-1024, 2007.
  18. An appropriate design for trusted computing and digital rights management (abstract), in 2007 Xiangshan Science Conference on Social Computing (Proc. XSCSC2007, Beijing, 8 April 2007), preparatory group of the 299th Academic Workshop of the Xiangshan Science Conference Series, Institute of Automation, Chinese Academy of Sciences, p. 23, 2007.
  19. On evaluating obfuscatory strength of alias-based transforms using static analysis, by Anirban Majumdar, Antoine Monsifrot, and Clark Thomborson, 14th International Conference on Advanced Computing and Communication (Proc. ADCOM 2006, Mangalore India, 20-23 December 2006), IEEE, pp. 605-610, 2007.
  20. A survey of control-flow obfuscations, by Anirban Majumdar, Clark Thomborson, and Stephen Drape, Information Systems Security (Proc. Second International Conference on Information Systems Security, Kolkata, India, 17-21 December 2006), LNCS 4332, pp. 353-356, 2006.
  21. Interpreting opacity in the context of information-hiding and obfuscation in distributed systems, by Anirban Majumdar and Clark Thomborson, in Proc. IEEE TENCON 2006 (Hong Kong, China, 14-17 November 2006), 4 pp., 2006.
  22. Governance of trusted computing, by Clark Thomborson and Matt Barrett, best paper award in IT Audit - Strategic Measures for Performance, Value & Quality (Proc. 2006 IT Governance Conference, Auckland, New Zealand, 13-15 November 2006), ISBN 1-877314-60-9, pp. 15-26, 2006.
  23. B2B e-commerce security modeling: a case study, by Han Zhang, William Zhu, Clark Thomborson, Gerald Weber, and Barry Dowdeswell, in 2006 International Conference on Computational Intelligence and Security (CIS'2006, Guangzhou, China, 3-6 November 2006), LNCS 4456, pp. 1549-1554, 2006.
  24. Recognition in software watermarking, by William Zhu and Clark Thomborson, First ACM Workshop on Content Protection and Security, pp. 29-36, 27 October 2006. Acceptance rate: 35%. This workshop was held in conjunction with ACM Multimedia 2006, Santa Barbara, California (USA).
  25. A survey-based analysis of HIPAA security requirements, by Jinho Lee, Clark Thomborson, and Gary Guest, paper G19 in HINZ Primary Care and Beyond: Building the e-Bridge to Integrated Care (Auckland, 9-11 August 2006), Eds: Christopher Peck & Jim Warren, Health Informatics New Zealand (HINZ) & Health Informatics Society of Australia Ltd (HISA), ISBN 0 9751013 7 4, 2006. To appear, subject to editorial revision, in a special issue of Health Care and Informatics Review Online.
  26. Extraction in software watermarking, by William Zhu and Clark Thomborson, in Proc. 8th workshop on Multimedia and Security (MM&Sec '06, Geneva, Switzerland, 26-27 September 2006), 175-181, 2006.
  27. Frameworks built on the trusted platform module, by Matt Barrett and Clark Thomborson, in 30th Annual International Computer Software and Applications Conference (COMPSAC 2006, Chicago IL USA, 17-21 September 2006), 59-62, 2006.
  28. Algorithms to watermark software through register allocation, by William Zhu and Clark Thomborson, in First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS 2005, Sydney, Australia, 31 Oct. - 2 Nov. 2005), ed. Safavi-Naini and Yung, LNCS 3919, pp. 180-191, July 2006.
  29. Obfuscate arrays by homomorphic functions, by William Zhu, Clark Thomborson, and Fei-Yue Wang, in IEEE Granular Computing 2006 (GrC 06), Atlanta GA (USA) pp. 770-773, May 2006.
  30. Applications of Homomorphic Functions to Software Obfuscation, by William Zhu, Clark Thomborson, and Fei-Yue Wang, in Proc. Workshop on Intelligence and Security Informatics (WISI'06, Singapore), LNCS 3917, Springer-Verlag, pp. 152-3, April 2006.
  31. Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation, by Anirban Majumdar and Clark Thomborson, in Proc. Twenty-Ninth Australasian Computer Science Conference (ACSC 2006, Hobart Australia), CRPIT Vol. 48, eds. V. Estivill-Castro and G. Dobbie, ACS, pp. 187-196, January 2006.
  32. A provable scheme for homomorphic obfuscation in software security, by William Zhu and Clark Thomborson, in Proc. IASTED International Conference on Communication, Network, and Information Security (CNIS 2005, Phoenix AZ, USA), ed. M.H. Hamza, ACTA Press, Vol. 499, ISBN 0-88986-537-X, pp. 208-212, December 2005. Submitted version.
  33. Securing mobile agents control flow using opaque predicates, by Anirban Majumdar and Clark Thomborson, in Knowledge-Based Intelligent Information and Engineering Systems (9th International Conference, KES 2005, Melbourne AU), Lecture Notes in Computer Science, Volume 3683, Springer-Verlag, pp. 1065-71, August 2005. Author's preprint.
  34. A survey of software watermarking, by William Zhu, Clark Thomborson, and Fei-Yue Wang, in Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics (ISI 2005, Atlanta, GA, USA, May 2005), LNCS vol 3495, Springer-Verlag, pp. 454 - 458, April 2005.
  35. On the QP algorithm in software watermarking, by William Zhu and Clark Thomborson, in Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics (ISI 2005, Atlanta, GA, USA, May 2005), LNCS vol 3495, Springer-Verlag, pp. 646 - 647, April 2005.
  36. On the use of opaque predicates in mobile agent code obfuscation, by Anirban Majumdar and Clark Thomborson, in Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics (ISI 2005, Atlanta, GA, USA, May 2005), LNCS vol 3495, Springer-Verlag, pp. 648 - 649, April 2005.
  37. Using NGSCB to mitigate existing software threats, by Matthew Barrett and Clark Thomborson, in Certification and Security in Inter-Organizational E-Services, eds. Narelli and Talamo, IFIP Vol. 177, Springer, ISBN 0-387-25087-5, pp. 55-74, 2005. See also Using NGSCB to mitigate existing software threats (preliminary version).
  38. Security improvements for encrypted interpretation, by Akito Monden, Antoine Monsifrot, and Clark Thomborson, Workshop on Application Specific Processors (WASP-2004). Published in the WASP-2004 Digest (distributed to workshop participants), pp. 19-26, 2004.
  39. Update patch management systems: a protocol taxonomy with security implications, by Andrew Colarik, Clark Thomborson, and Lech Janczewski, in 19th IFIP WG 11.1 Annual Working Conference on Information Security Management at WCC'04, Building the Information Society, IFIP International Federation for Information Processing Vol. 156, Jacquart, Reni (Ed.), Kluwer, ISBN 1-4020-8156-1, pp. 67-80, 2004.
  40. Threading software watermarks, by Jasvir Nagra and Clark Thomborson, Proc. 6th International Workshop on Information Hiding (IH 2004), LNCS 3200, Springer-Verlag, pp 208-233, 2004. Preprint version.
  41. A framework for obfuscated interpretation, by Akito Monden, Antoine Monsifrot, and Clark Thomborson. In Proc. Second Australasian Information Security Workshop (AISW2004), ed. P. Montague and C. Steketee, ACS, CRPIT Vol. 32, pp. 7-16, 2004.
  42. Tamper-proofing software watermarks, by Clark Thomborson, Jasvir Nagra, Ram Somaraju, and Charles He. In Proc. Second Australasian Information Security Workshop (AISW2004), ed. P. Montague and C. Steketee, ACS, CRPIT Vol. 32, pp. 27-36, 2004.
  43. Graph-based approaches to software watermarking, by Christian Collberg, Stephen Kobourov, Edward Carter, and Clark Thomborson, in Graph-Theoretic Concepts in Computer Science (Proc. 29th Workshop on Graph Theoretic Concepts in Computer Science, WG'2003, 18-21 June 2003, Elspeet, the Netherlands), Lecture Notes in Computer Science 2880, Springer-Verlag, October 2003, pp. 156-167.
  44. Folklore confirmed: reducible flow graphs are exponentially larger, by Larry Carter, Jeanne Ferrante, and Clark Thomborson, Proc. of 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'03), ACM, 106-114, January 2003.
  45. Recommendations for internet safety at home, by Clark Thomborson, in Proc. NetSafe: Society, Safety and the Internet, ed. John Hosking, Technical Report 172, Department of Computer Science, University of Auckland, pp. 118-123, February 2002. Presentation slides.
  46. A functional taxonomy for software watermarking, by Jasvir Nagra, Clark Thomborson, and Christian Collberg, in Proc. 25th Australasian Computer Science Conference 2002, ed. MJ Oudshoorn, ACS, pp. 177-186, January 2002.
  47. Measuring data cache and TLB parameters under Linux, by Clark Thomborson and Yuanhua Yu, in 2000 Symposium on Performance Evaluation of Computer and Telecommunication Systems, Society for Computer Simulation International, Vancouver BC, 383-390, July 2000.
  48. Data cache parameter measurements, by Li Enyou and Clark Thomborson, Proc. IEEE International Conference on Computer Design (ICCD'98), pp. 376-383, October 1998.
  49. NZ needs to invest heavily in research, by Clark Thomborson, NZInfoTech Weekly, 15 March 1999.
  50. Software watermarking: models and dynamic embeddings, by Christian Collberg and Clark Thomborson, POPL 99, January 1999, 311-324.
  51. Evaluation of gigabit Ethernet with Java/HORB, by Y. Yasu, H. Fujii, Y. Igarishi, E. Inoue, H. Kodama, A. Manabe, Y. Watase, Y. Nagasaka, M. Nomachi, S. Hirano, H. Takagi, K. Shudo, T. Arai, L. Sarmenta, C. Thomborson, R. Nicolescu, and M. Duc, Proc. CHEP'98, Chicago USA, September 1998.
  52. Breaking abstractions and unstructuring data structures, by Christian Collberg, Clark Thomborson and Douglas Low, Proc. IEEE International Conference on Computer Languages (ICCL'98), pp. 28-38, May 1998. DOI: 10.1109/ICCL.1998.674154.
  53. Manufacturing cheap, resilient, and stealthy opaque constructs, by Christian Collberg, Clark Thomborson and Douglas Low, Proc. 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98), pp. 184-196, January 1998.
  54. The economics of large-memory computations, by Clark Thomborson, Algorithms and Architectures for Parallel Processing, Proc. 1997 3rd International Conference (ICA3PP'97), eds. Goscinski, Hobbs, and Zhou, World Scientific, pp. 579-592, December 1997.
  55. CS gender gap still a problem, by Clark Thomborson, Computing Research News, pp. 2-3, November 1995. Please see my website for an updated version and data files.
  56. Rectilinear Steiner tree minimization on a workstation, by Clark Thomborson, Bowen Alpern, and Larry Carter, Computational Support for Discrete Mathematics: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Volume 15, eds. N. Dean and G.E. Shannon, American Mathematical Society, pp. 119-136, 1994.
  57. Tools for randomized experimentation, by Clark Thomborson, Proc. Interface '93: the 25th Symposium on the Interface between Computing Science and Statistics, The Interface Foundation of North America, 412-416, 1994.
  58. Why are fewer females obtaining bachelor's degrees in computer science?, by Clark Thomborson, SIGACT News 24:3, 114-116, September 1993. Please see my website for an Updated version and data files.
  59. Optimizing carry lookahead adders for semicustom CMOS, by Clark Thomborson and Yi Sun, Proc. Third Great Lakes Symposium on VLSI, IEEE Computer Society, 119-122, March 1993.
  60. A probably fast, provably optimal algorithm for rectilinear Steiner trees (extended abstract), by Linda L. Deneen, Gary M. Shute, and Clark Thomborson, in The Fourth Canadian Conference on Computational Geometry, Computer Science Department, Memorial University of Newfoundland, 1992.
  61. Gate array global routing using a neural network, by Yanzhang Lu and Clark Thomborson, Proc. Artificial Neural Networks in Engineering, Vol. 1, eds. Dagli, Kumara, and Shin, 895-900, ASME, November 1991.
  62. Delay optimization of carry-skip adders and block carry-lookahead adders, by Pak K. Chan, Martine D.F. Schlag, Clark D. Thomborson, and Vojin G. Oklobdzija, Proc. 10th IEEE Symposium on Computer Arithmetic, 154-164, June 1991.
  63. V.42bis and other Ziv-Lempel Variants (Abstract), by Clark D. Thomborson, Proc. Data Compression Conference, IEEE, p. 460, April 1991.
  64. Systolic Designs for a Move-To-Front Text Compressor (reprinted from SPAA 89, by Clark D. Thomborson and Belle W.-Y. Wei, Computer Architecture News 19:1, 53-60, March 1991.
  65. A dualizable representation for general graphs, by Clark D. Thomborson, Linda L. Deneen, and Gary M. Shute, Graph Theory, Combinatorics, and Applications (Proc. Sixth International Conference on the Theory and Applications of Graphs, 1988), ed. Y. Alavi et al., John Wiley and Sons, New York, 343-357, 1991.
  66. Asymptotically tight bounds for computing with faulty arrays of processors (extended abstract), by C. Kaklamanis, A.R. Karlin, F.T. Leighton, V. Milenkovic, P. Raghavan, S. Rao, C. Thomborson, and A. Tsantilas, Proc. 31st Annual Symposium on Foundations of Computer Science, 285-296, November 1990. DOI: 10.1109/FSCS.1990.89547.
  67. Enhancements to Ziv-Lempel Data Compression, by Clyde Rogers and Clark D. Thomborson, COMPSAC 89: Proc. 13th International Computer Software and Applications Conference, IEEE, 324-330, 1989.
  68. Systolic Designs for a Move-To-Front Text Compressor, by Clark D. Thomborson and Belle Wei, Proc. ACM Symposium on Parallel Algorithms and Architectures, 283-290, 1989.
  69. Simulating MOS VLSI Circuits using SuperCrystal, by Romy L. Bauer, Antony P-C Ng, Arvind Raghunathan, and Clark D. Thompson, VLSI-87, ed. C.H. Séquin, Elsevier Science Publishers B.V. (North-Holland), IFIP, 337-352, 1988.
  70. Computing a rectilinear Steiner minimal tree in n^(O\sqrt(n)) time, by Clark Thomborson, Linda L. Deneen, and Gary M. Shute, in Mathematical Research, volume 38: Parallel Algorithms and Architectures (Proc. International Workshop on Parallel Algorithms and Architectures, Suhl (GDR), May 1987), eds. Albrecht et al., Akademie-Verlag Berlin, 176-183, 1987.
  71. A language for describing rectilinear Steiner tree configurations, by Antony P-C Ng, Prabhakar Raghavan, and Clark Thompson, 1986 ACM Design Automation Conference, 659-662, June 1986.
  72. Signal delay in RC trees with charge sharing or leakage, by Arvind Raghunathan and Clark Thompson, Proc. 19th Annual Asilomar Conference on Circuits, Systems, and Computers, IEEE Computer Society, 557-560, November 1985. Note: a poor-quality scan of this document is available in IEEEy Explore.
  73. On the area-time optimal design of l-selectors, by Clark Thompson and Hiroto Yasuura, Proc. 19th Annual Asilomar Conference on Circuits, Systems, and Computers, IEEE Computer Society, 365-368, November 1985. Note: a poor-quality scan of this document is available in IEEE Xplore .
  74. Time-optimal design of a CMOS adder, by Belle W. Y. Wei, Clark Thompson, and Yih-farn Chen, Proc. 19th Annual Asilomar Conference on Circuits, Systems, and Computers, IEEE Computer Society, 186-191, November 1985. Note: the archival version in IEEE Explore is almost illegible.
  75. Provably good routing in graphs: regular arrays, by Prabhakar Raghavan and Clark Thompson, Proc. 17th Annual ACM Symp. on Theory of Computing, 79-87, May 1985.
  76. A pipelined architecture for search tree maintenance, by Michael J. Carey and Clark D. Thompson, Algorithmically Specialized Parallel Computers, ed. Lawrence Snyder et al., Academic Press, ISBN 0126541302, pp. 37-46, 1985.
  77. Sorting records in VLSI, by Michael J. Carey, Paul M. Hansen, and Clark D. Thompson, Algorithmically Specialized Parallel Computers, ed. Lawrence Snyder et al., Academic Press, 27-36, 1985.
  78. Area-time complexity for VLSI, in Artificial Intelligence and Information-Control Systems of Robots, ed. I. Plander, Elsevier Science Publishers, 373-382, 1984.
  79. On the energy-time-area cost of a memory access, by Clark D. Thompson, Proc. WG'83 Workshop on Graphtheoretic Concepts in Computer Science, Osnabrück, Trauner-Verlag, 354-369, 1984. (Note: this pdf was scanned in 2013 from a 30-year old photocopy of the published proceedings and of the submitted version -- this second copy is incorrectly paginated but has much more accurate OCR.)
  80. On estimating the performance of VLSI circuits, by Clark Thompson and Prabhakar Raghavan, MIT VLSI Conference, 34-44, January 1984.
  81. Global wire routing in two-dimensional arrays, by R. M. Karp, F. T. Leighton, R. Rivest, C. Thompson, V. V. Vazirani, and U. V. Vazirani, 24th Annual Symp. on Foundations of Computer Science, 453-459, November 1983.
  82. The VLSI complexity of sorting, in VLSI Systems and Computations (Proc. CMU Conf. on VLSI Systems and Computations, 19-21 October 1981, Pgh PA USA), ed. Kung, Sproull, Steele, Prentice-Hall, 1981.
  83. Fourier transforms in VLSI, Proc. ICCC-80, 1046-1051, October 1980.
  84. Area-time complexity for VLSI, Proc. 11th Annual ACM Symp. on Theory of Computing, 81-88, April 1979.
  85. Area-time complexity for VLSI, Proc. Caltech Conf. on VLSI Systems and Computations, 495-508, January 1979.
  86. Direct VLSI implementation of combinatorial algorithms, by L. J. Guibas, H. T. Kung, and C. D. Thompson, Proc. C-MU Conf. on VLSI Systems and Computations, 509-525, January 1979.
  87. On the average number of maxima in a set of vectors and applications, by J. L. Bentley, H. T. Kung, M. Schkolnick, and C. D. Thompson, Proc. 15th Annual Allerton Conf. on Communication, Control, and Computing, September 1977.
  88. Sorting on a mesh-connected parallel computer, by C. D. Thompson and H. T. Kung, Proc. 1976 ACM Symp. on Theory of Computing, 58-64, May 1976.

Software Releases:

  1. Mrandom version 3.0, by Clark Thomborson and Robert Plotkin, available by anonymous ftp from http://www.cs.auckland.ac.nz/~cthombor/Mrandom/V3.0, June 1993.
  2. Mrandom version 2.3, by Clark Thomborson, September 1992. No longer available by anonymous ftp.
  3. Mrandom: a random number generator with persistent state, by Clark Thomborson, Comp.sources.unix, Volume 25, Issue 23, December 1991.

Chapters in Books:

  1. A Framework for System Security, by Clark Thomborson, in Handbook of Information and Communication Security, eds. P. Stavroulakis and M. Stamp, Springer, 6 March 2010. Word cloud, produced by Wordle.
  2. Incredible codes, by Clark Thomborson and Bob Doran, in Incredible Science, ed. Alison Brook, Puffin Books, Penguin, pp. 16-17, July 2005.
  3. The role of military funding in academic computer science, by Clark D. Thomborson, in Computers in battle - will they work?, eds. Bellin and Chapman, Harcourt Brace Jovanovich, 283-296, 1987.

Technical Reports and White Papers:

  1. Privacy Patterns, arXiv:1612.01553, 8 pp., 5 December 2016.
  2. Benchmarking Obfuscators of Functionality, arXiv:1501.02885, 8 pp., 13 January 2015.
  3. Data Protection: Problem Statement and Requirements for Future Solutions, A White Paper by Members of the Jericho Forum, a forum of The Open Group, 17 pp., October 2012. Lead author: Stephen T. Whitlock, with significant contributions from Adrian Seccombe, John Sherwood, Paul Simmonds, Clark Thomborson, Shane Tully, Andrew Yeomans, and Ian Dobson.
  4. Dynamic graph-based software watermarking, by Christian Collberg, Clark Thomborson, and Gregg M. Townsend, Technical report TR04-08, Computer Science Department, University of Arizona (USA), 46 pp., 28 April 2004.
  5. Obfuscated instructions for software protection, by Akito Monden, Antoine Monsifrot, and Clark Thomborson, Information Science Technical Report, NAIST-IS-TR2003013, ISSN 0919-9527, Graduate School of Information Science, Nara Institute of Science and Technology (Japan), November 2003.
  6. Watermarking, tamper-proofing, and obfuscation - Tools for software protection, by Christian Collberg and Clark Thomborson, Computer Science Department Technical Report 170, University of Auckland, February 2000, 15 pp. Identical to Computer Science Department Technical Report 2000-03, University of Arizona (USA).
  7. Evaluation of gigabit Ethernet with Java/HORB, by Y. Yasu, H. Fujii, Y. Igarishi, E. Inoue, H. Kodama, A. Manabe, Y. Watase, Y. Nagasaka, M. Nomachi, S. Hirano, H. Takagi, K. Shudo, T. Arai, L. Sarmenta, C. Thomborson, R. Nicolescu, and M. Duc, KEK Preprint 98-181, KEK High-Energy Accelerator Research Organization, Tokyo, Japan, 8 pp., November 1998. Also appears as CITR Technical Report TR-41, February 1999.
  8. On the limits of software watermarking, by Christian Collberg and Clark Thomborson, Computer Science Department Technical Report number 164, University of Auckland, 14 pp., August 1998.
  9. A taxonomy of obfuscating transformations, by Christian S. Collberg, Clark Thomborson and Douglas Low, Computer Science Department Technical Report number 148, University of Auckland, 36 pp., July 1997.
  10. When Virtual Memory Isn't Enough, by Clark Thomborson, Computer Science Department Technical Report number 136, University of Auckland, 21 pp., November 1996.
  11. An Introduction to mrandom 3.0, by Clark Thomborson, UMD Computer Science Department Technical Report 93-02, 36 pp., July 1993.
  12. Rectilinear Steiner tree minimization on a workstation, by Clark Thomborson, Bowen Alpern, and Larry Carter, IBM TJ Watson Research Center report RC 17680 (#77873), 15 pp., February 11, 1992.
  13. Does your computation belong on a supercomputer?, by Clark Thomborson, UMD Computer Science Department Technical Report 91-04, 14 pp., May 1991.
  14. V.42bis and other Ziv-Lempel variants, by Clark D. Thomborson, UMD Computer Science Department Technical Report 91-02, 13 pp., April 1991.
  15. When is a supercomputer no better than a workstation?, by Clark D. Thomborson and James L. Fenno, University of Minnesota Supercomputer Institute Research Report UMSI 90/103R, (identical to UMD Computer Science Department Technical Report 90-5), 14 pp., June 1990.
  16. When is a Cray-2 no better than a workstation?, by Clark D. Thomborson and James L. Fenno, UMD Computer Science Department Technical Report 89-10, 9 pp., September 15, 1989.
  17. Enhancements to Ziv-Lempel data compression, by Clyde Rogers and Clark D. Thomborson, UMD Computer Science Department Technical Report 89-2, 13 pp., January 1989.
  18. An O(n log n) plane-sweep algorithm for L1 and L¥ Delaunay triangulations, by Gary M. Shute, Linda L. Deneen, and Clark D. Thomborson, UMD Computer Science Mathematics and Statistics Technical Report 87-5, 30 pp., September 1987.
  19. Multiterminal global routing: a deterministic approximation scheme, by Prabhakar Raghavan and Clark Thompson, IBM TJ Watson Research Center report RC 12806 (#57605), 11 pp., June 1987.
  20. Time-optimal design of a CMOS adder, by Belle W. Y. Wei, Clark Thompson, and Yih-farn Chen, UCB/CSD 86/252, 13 pp., August 1985.
  21. A minimum-area circuit for l-selection, by Pavol Duris, Ondrej Sýkora, Clark Thompson, and Imrich Vrto, UCB/CSD 85/244, 13 pp., June 1985.
  22. Randomized rounding: a technique for provably good algorithms and algorithmic proofs, by Prabhakar Raghavan and Clark Thompson, UCB/CSD 85/242, 14 pp., June 1985.
  23. Signal delay in RC trees with charge sharing or leakage, by Arvind Raghunathan and Clark Thompson, UCB/CSD 85/243, 23 pp., June 1985.
  24. Randomized routing in gate arrays, by Prabhakar Raghavan and Clark Thompson, UCB/CSD 84/202, 17 pp., September 1984.
  25. On estimating the performance of VLSI circuits, by Clark Thompson and Prabhakar Raghavan, UCB/CSD 84/138, 18 pp., September 1983. OCR version.
  26. VLSI implementation of digital Fourier transforms, by A. Despain, C. Séquin, C. Thompson, E. Wold, and D. Lioupis, UCB/CSD 82/111, 85 pp., November 1982.
  27. Fourier transforms in VLSI, UCB/CSD 82/105, 29 pp., September 1982.
  28. RESST: A VLSI implementation of a record-sorting stack, by Michael J. Carey, Paul M. Hansen, and Clark D. Thompson, UCB/CSD 82/102, 26 pp., April 1982.
  29. An efficient implementation of search trees on \ceiling{log n + 1} processors, by Michael J. Carey and Clark D. Thompson, UCB/CSD 82/101, 16 pp., April 1982.
  30. The VLSI complexity of sorting, UCB/ERL M82/5, 37 pp., February 1982.
  31. Fourier transforms in VLSI, UCB/ERL M80/51, 15 pp., October 1980.
  32. A complexity theory for VLSI, Ph.D. dissertation, Carnegie-Mellon University, Computer Science Dept. Technical Report CMU-CS-80-140, 131 pp., August 1980.
  33. Generalized connection networks for parallel processor intercommunication, by C. D. Thompson, Technical Report (paper 2272), Computer Science Department, C-MU, 15 pp., May 1977.
  34. On the average number of maxima in a set of vectors and applications, by J. L. Bentley, H. T. Kung, M. Schkolnick, and C. D. Thompson, C-MU Tech. Report, 16 pp., July 1977. DTIC accession number ADA042597.
  35. Sorting on a mesh-connected parallel computer, by H. T. Kung and C. D. Thompson, Technical Report (paper 1615), Computer Science Department, C-MU, 27 pp., March 1976.
  36. Depth perception in stereo computer vision, Stanford AIM-268 (STAN-CS-75-521), 15 pp., October 1975. Low-resolution scan of marked-up copy in DTIC collection.

Selected talks, colloquia, etc.

  1. Privacy Patterns (pdf version), by Clark Thomborson, presented orally at PST 2016, Auckland (NZ), 13 December 2016. An eight-page preprint of the conference paper is available as arXiv:1612.01553, 5 December 2016.
  2. The Deep Web, Bitcoins, Silk Road and 21st Century Society, 10-minute interview on The Thursday Wire, 95bFM, University of Auckland, 1 May 2014.
  3. Protecting Privacy: Who Is Responsible?, oral presentation to the New Zealand Information Security Forum, Auckland, 12 September 2013.
  4. Securing Personas, oral presentation in the Security track at The Open Group Enterprise Transformation Conference, Sydney, 15-18 April 2013. Abstract.
  5. A Graphic Expression for Privacy and Identity Claims, oral presentation at a Technology and Privacy Forum for the Privacy Commissioner of New Zealand, University of Auckland, 20 June 2012. This seminar was also presented to the Technology and Privacy Group of the Privacy Commissioner, in Wellington, on 15 June 2012.
  6. Networked Identity, oral presentation, Computer Security Division, National Institute of Standards and Technology, USA, 16 March 2012.
  7. Networked Identity, oral presentation, Macquarie University Security Research Group Seminar (INSS) 8 February 2012.
  8. Networked Identity, oral presentation to the End to End Trust group at Microsoft (Redmond, WA, USA), 13 December 2011.
  9. Networked Identity, oral presentation at Yahoo! Research (Sunnyvale, CA, USA), 9 December 2011.
  10. Security through Obscurity, guest lecture in Mark Stamp's Topics in Information Security course at San Jose State University (California, USA), 7 December 2011.
  11. Obfuscation and Tamperproofing, presentation at Tsinghua University, School of Software, as a member of their Chair Professor Group of Software Theory, 19 March 2010.
  12. Techniques for Software Watermarking and Fingerprinting, presentation at Tsinghua University, School of Software, as a member of their Chair Professor Group of Software Theory, 17 March 2010.
  13. Security Modelling: What is Security?, presentation at Tsinghua University, School of Software, as a member of their Chair Professor Group of Software Theory, 12 March 2010.
  14. Software Security for the Cloud, presentation at Tsinghua University, School of Software, as a member of their Chair Professor Group of Software Theory, 11 March 2010.
  15. Limited Autonomy, by Clark Thomborson, keynote address at the Eighth International Conference on Dependable, Autonomic and Secure Computing (DASC-09), Chengdu, China, 12-14 December 2009.
  16. Sensible Sensors: Privacy and smart sensor technologies, moderated panel discussion at KPMG Auckland, 6 May 2009.
  17. Foundation for System Security, invited lecture at the 7th Australasian Information Security Conference, Wellington, NZ, 20 January 2009.
  18. A Model for New Zealand's Identity Verification Service, by Clark Thomborson, presentation at TRUST 2008, Villach, Austria, 12 March 2008.
  19. The Promise and Peril of Trusted Computing in Governmental Systems, by Clark Thomborson, presentation to Educational Event at TRUST 2008, Villach, Austria, 11 March 2008. Also presented to the Institute of Automation, Chinese Academy of Sciences, 20 March 2008.
  20. Could Software Watermarks Express Both Rules and Assurances?, by Clark Thomborson, presentation to ReTrust workshop at TRUST 2008, Villach, Austria, 11 March 2008.
  21. NZ taking part in cyber terrorist exercise, excerpt from phone interview included in TV3 news broadcast, 7:38pm 9 March 2008.
  22. Exploring the Weakest Link: A Study of Personal Password Security, by Gilbert Notoatmodjo and Clark Thomborson, presentation at New Zealand Information Security Forum, Auckland, 20 December 2007.
  23. Profiling danger in identity system, interview by Claire McEntee, The Dominion Post (Wellington, NZ), 10 December 2007.
  24. Interview on Radio Live regarding the police interview of AKILL in the Waikato, 12:45pm to 12:50pm, 30 November 2007.
  25. Architecting Systems to Protect Intellectual Property, by Clark Thomborson, presentation at an NZTE China Workshop, Auckland NZ, 16 November 2007.
  26. Protecting Software with Watermarks, presentation by Clark Thomborson to a Connect Workshop run by UniServices at Microsoft House, Auckland, 18 October 2007.
  27. The Jericho Forum's Architecture for De-Perimeterised Security, keynote address by Clark Thomborson at Practical IT Governance in a Connected World (Oceania CACS 2007), Auckland NZ, 9-12 September 2007.
  28. Enterprise Content Management in a De-Perimeterised Environment, Jericho's Architecture for De-Perimeterised Security, by Clark Thomborson, ISACA/IIA Lunchtime Education Session, 27 July 2007, Wellington NZ.
  29. Methods for Software Protection, keynote lecture at The International Forum on Computer Science and Advanced Software Technology, Jiangxi Normal University, 10-11 June 2007.
  30. The Future of Enterprise Content Management (in a De-perimeterised Environment), presentation at a Microsoft Enterprise Content Management event, Fronde, Level 7, 131 Queen Street, 4:30 to 6pm, 2 May 2007.
  31. Government Policy on Trusted Computing and Digital Rights Management: A View from New Zealand and Methods for Software Protection, seminars hosted by Antony Ng at DSO National Laboratories, Singapore, 10 April 2007.
  32. An Appropriate Design for Trusted Computing and Digital Rights Management, keynote speech at the 2007 Xiangshan Science Conference on Social Computing (XSCSC2007), Institute of Automation, Chinese Academy of Sciences, 8 April 2007.
  33. Trusted Computing and Digital Rights Management in a De-perimeterised Environment, seminar to Dennis Soong's group at Lenovo R&D, Beijing, 5 April 2007.
  34. An Appropriate Design for Trusted Computing and Digital Rights Management, seminar to Wenbo Mao's group at HP Labs, Beijing, 4 April 2007; to Prof Dongdai Lin's group at the State Key Laboratory of Information Security (SKLOIS) at the Institute of Software, Beijing, 3 April 2007; Zheng Zhang's group at Microsoft Research Asia, Beijing, 30 March 2007; and to Prof CHEN Zhong's group at Peking University, Beijing, 9 April 2007.
  35. What is Security? and An Appropriate Design for Trusted Computing and Digital Rights Management, seminars hosted by Jishou Ruan at Nankai University on 2 April 2007, and by Andy Yao at Tsinghua University on 29 March 2007.
  36. How TPMs Can (and Should) Control Copyright, presentation at the "Tackling the Copyright Amendment Bill" workshop, InternetNZ, Wellington, 13 February 2007.
  37. An Appropriate Design for Trusted Computing and Digital Rights Management, presentation to the e-Government Unit of the State Services Commission of New Zealand, 8 December 2006.
  38. Defensible Digital Boundaries, moderated panel discussion with Bojan Zdrnja, Peter Gutmann, Darren Bilby, Andrew Lee, and Gordon Grant, at AVAR'06, 5 December 2006.
  39. Governance of trusted computing, by Clark Thomborson, seminar to the TRUST group at UC Berkeley, 25 October 2006.
  40. Trusted Computing: Open, Closed, or Both?, by Clark Thomborson, Trusted Systems Laboratory at HP Bristol, 24 April 2006. An earlier version of this slideshow was presented to the Applied Data Security Group at Bochum University, 21 April 2006; as a Computer Science Department Seminar, U of Auckland, 6 April 2006; and to the New Zealand Information Security Forum, Auckland, 9 March 2006. This slideshow was also presented at a research seminar on 28 April 2006 at Cardiff University.
  41. Interview on the "Credit card fraud" segment of Morning Report, Radio New Zealand, 8:40am to 8:43am, 24 November 2005.
  42. A survey of software watermarking, invited lecture at the Institute of Automation, Chinese Academy of Sciences, Beijing, 5 May 2005.
  43. Interview on the "Hackers" segment of TV2's Flipside show, 28 September 2004.
  44. NGSCB - A new tool for securing applications, by Matt Barrett and Clark Thomborson, seminar at the New Zealand Information Society Forum, 12 August 2004. Presentation slides of Matt Barrett and Clark Thomborson.
  45. New techniques for software protection, by Jasvir Nagra and Clark Thomborson, Computer Science Department Seminar, University of Auckland, 20 May 2004. Also presented at Cloakware Corporation, Ottawa (Canada), 26 May 2004, and at Digital Security Seminar, Carleton University, Ottawa (Canada), 27 May 2004.
  46. Methods for software protection, Stanford Security Seminar, Stanford University, 2 March 2004; also guest lecture in Mark Stamp's CS 265 class on Cryptography and Computer Security, San Jose State University, 1 March 2004.
  47. A framework for obfuscated interpretation, Microsoft Research Tech Talk, Redmond WA (USA), 24 November 2003.
  48. Methods for software protection, Computing and Software Systems Seminar, University of Washington, Tacoma WA (USA), 19 November 2003.
  49. A framework for obfuscated interpretation, Computer Science Colloquium, University of Arizona, Tucson AZ (USA), 6 November 2003.
  50. Applications of graph theory to software security, invited lecture at USP 2003 Conference on Applied Algebra, Cryptography and Information Technology, Suva, Fiji, 2-6 June 2003.
  51. Interview on the "Privacy invaders" segment of TV2's Flipside show, 5 June 2003.
  52. Challenges in software security (90 KB file in PPS format), lecture by Clark Thomborson at the 1 March 2001 meeting of the New Zealand Information Security Forum.
  53. Software security, a seminar presented at the 21st Anniversary Symposium, Computer Science Department, University of Auckland, 14 February 2001.
  54. The economics of large-memory computations, Computer Science colloquium, University of Arizona (USA), 18 November 1999.
  55. An open letter to the Foresight Project on the need for strategically targeted basic research in New Zealand, signed by 54 academic computer scientists. Mentioned in InfoTech Weekly, 15 February 1999.
  56. Strategically targeted basic research in New Zealand?, Computer Science colloquium, University of Waikato 3 December 1998, University of Auckland 8 December 1998.
  57. Computing: the next twenty years, IEEE Computer Society, Auckland Branch, 14 September 1998.
  58. Ways to excel as a stage-4 student (PowerPoint presentation for a 20-minute seminar delivered 26 Feb 99 to Computer Science students at the SMIS Graduate Workshop).
  59. Towards an economic theory for large-memory computations, Computer Science Department, Otago University, Dunedin NZ, 21 March 1997; and Computer Science Department, University of Canterbury, Canterbury NZ, 19 March 1997.
  60. Why aren't there more women computer scientists?, Computer Science Department, Otago University, Dunedin NZ, 21 March 1997; Centre for Computing and Biometrics, Lincoln University, Lincoln NZ, 20 March 1997; and Computer Science Department, University of Canterbury, Canterbury NZ, 19 March 1997.
  61. Modelling hierarchical memory, Computer Science Department, Victoria University, Wellington NZ, 24 October 1996.
  62. Why aren't there more women computer scientists?, Computer Science Department, Victoria University, Wellington NZ, 24 October 1996.
  63. Modelling hierarchical memory, Computer Science Department, Massey University, Palmerston North NZ, 23 October 1996.
  64. Why aren't there more women computer scientists?, Computer Science Department, Massey University, Palmerston North NZ, 23 October 1996.
  65. Modelling hierarchical memory, Computer Science and Engineering Department colloquium, University of California at San Diego, 9 September 1996.
  66. Modelling hierarchical memory, Computer Science Department colloquium, Waikato University (NZ), 6 August 1996.
  67. Finding a good job as a programmer, Computer Science Department seminar, Auckland University (NZ), 8 June 1995.
  68. LMH: a programmer's interface to the linearized memory hierarchy, Computer Science Department colloquium, Auckland University (NZ), 7 June 1995.
  69. Why aren't there more women computer scientists?, Computer Science Department seminar, Auckland University (NZ), 6 June 1995.
  70. Why are fewer women majoring in computer science these days?, informal seminar/discussion, Computer Professionals for Social Responsibility, Minneapolis, 9 May 1995.
  71. A programmer's interface to the memory hierarchy, Computer Science department colloquium, U of Illinois at Urbana-Champaign, 1 May 1995.
  72. Linearizing the memory hierarchy, Midwest Theory Day, U of Illinois at Urbana-Champaign, 29 April 1995.
  73. Linearizing the memory hierarchy, Computer Science Colloquium, U of Minnesota, 19 April 1995.
  74. Finding a good job as a programmer, informal seminar/discussion, IEEE student chapter, U Minnesota, Minneapolis, 15 October 1994.
  75. When are supercomputers cheaper than workstations?, invited lecture, High Performance Computing Workshop, Cetraro, Italy, 27-29 June 1994.
  76. Algorithm design for high-performance computers, CS Department Colloquium, Tufts University, 26 March 1994.
  77. Towards a visualization tool for performance evaluation (abstract only), SuperComputing 1993, Portland, November 1993.
  78. Tools for scientific computation: visualization and randomization, Computer Science department colloquium, U Minnesota, Minneapolis, October 18, 1993.
  79. On visualizing the flow of information in a supercomputer, invited lecture, DIMACS Workshop on Models, Architectures, and Technologies for Parallel Computation, Rutgers University, September 20-22, 1993.
  80. What is interesting about IBM's AS/400 line of computers?, Computer Science department colloquium, U Minnesota at Duluth, May 12, 1993.
  81. Does your computation belong on a vector supercomputer or on a workstation?, DEC Cambridge Research Laboratory, March 15, 1993.
  82. Does your computation belong on a vector supercomputer or on a workstation?, Computer Systems Engineering Seminar, UMass-Amherst, February 25, 1993.
  83. Does your computation belong on a vector supercomputer or on a CM-5?, Thinking Machines Corporation, January 19, 1993.
  84. Rectilinear Steiner tree minimization on a workstation, DIMACS Workshop on Computational Support for Discrete Mathematics, Rutgers, March 12-14, 1992.
  85. Computers in the office of the future, Minn-Arrow Chapter of Professional Secretaries International, Superior WI, January 15, 1991.
  86. Probabilistic algorithms for VLSI routing, invited lecture (delivered by P. Raghavan), 1988 TIMS/ORSA Meeting, Washington, D.C., April 27, 1988.
  87. Military control of academic research, invited lecture at ``Our unexamined debts: government, corporations, and the university,'' a symposium at Johns Hopkins University, February 27, 1988.
  88. A uniform representation for partially embedded graphs, colloquium at Johns Hopkins Computer Science Department, February 26, 1988.
  89. A uniform representation for partially embedded graphs, invited lecture at the IMA Workshop on Applications of Combinatorics and Graph Theory to Computer Science Including VLSI Design, Minneapolis, December 16, 1987.
  90. The effects of SDI on universities, invited lecture at ``Star Wars and national security: a conference on the Strategic Defense Initiative,'' UC Berkeley, October 9, 1986.
  91. Statement on Star Wars, signed by nine members of the Computer Science Division of UC Berkeley, circa October 1985.
PhD Supervision
  1. Zulfiqar Ahmad, A Duly Diligent Response to the Concerns of Muslim Stakeholders, University of Auckland, December 2011.
  2. Anirban Majumdar, Design and Evaluation of Software Obfuscations, co-supervised by Dr Stephen Drape, University of Auckland, 2008. Winner of departmental "Best Published Paper" award, 2007.
  3. William Zhu, Concepts and techniques in software watermarking and obfuscation, University of Auckland, August 2007.
  4. Jasvir Nagra, Threading software watermarks, University of Auckland, February 2007.
  5. Andrew Michael Colarik, A secure patch management authority, University of Auckland, November 2003. Primary supervisor: Associate Professor Lech Janczewski.
  6. Arvind Raghunathan, Polygon Decomposition and Perfect Graphs, University of California at Berkeley, 1988.
  7. Belle Wei, Synthesis and optimization of VLSI prefix circuits, Ph.D. dissertation, Computer Science Division, UC Berkeley, May 1987.
  8. Prabhakar Raghavan, Randomized rounding and discrete ham-sandwich theorems: provably good algorithms for routing and packing problems, Ph.D. dissertation, Computer Science Division, UC Berkeley, May 1986.
MSc/ME Supervision
  1. Yu-Cheng Tu, (ME Second Class, July 2008: A Preliminary Security Analyais of New Zealand's igovt System).
  2. Gilbert Notoatmodjo, (MSc First Class, Exploring the Weakest Link: A Study of Personal Password Security, submitted for assessment, July 2007; revised for internet publication, December 2007).
  3. Jinho Lee, (ME First Class, September 2006: Perceptions of HIPAA Security Requirements by US Dental Schools).
  4. Lei Wang, (MSc, September 2006: A Constant Encoding Algorithm Which Tamper-proofs the CT-Watermark). 780 project student March-June 2005.
  5. Teng Teng, (MSc Second Class First Division, July 2006: Unauthorized Detection of CT Watermarks Based on Pattern Analysis Methods). 780 project student March-June 2005.
  6. Han Zhang, (MSc Second Class Second Division, July 2006: Formal Security Modeling and Analysis in B2B e-commerce), co-supervised by Gerald Weber. ICT Academy project on Secure P2P Message Exchanging in a Test Harness, 14 February 2005, co-supervisor Gerald Weber, industry mentor Barry Dowdeswell.
  7. Mike Stay (MSc First Class, 2005: Truth and Light: Physical Algorithmic Randomness), co-supervised by Prof Cris Calude.
  8. Matt Barrett (BSc Hons, 2003; MSc First Class, 2005: Towards an Open Trusted Computing Framework). Co-author of Using NGSCB to Mitigate Existing Software Threats (preliminary version), in Certification and Security in Inter-Organizational E-Services, eds. Narelli and Talamo, IFIP Vol. 177, Springer, ISBN 0-387-25087-5, pp. 55-74, 2005. Author of "Using NGSCB to Solve Existing Software Vulnerabilities", project report, November 2003.
  9. Benjamin Lai (MSc First Class, February 2004: Trust in Online Trading Systems).
  10. Yong (Charles) He, (MSc, 2002: Tamperproofing a Software Watermark by Encoding Constants).
  11. Jihong Li, (MSc, Second Class Division 1, 2002: A Fifth Generation Messaging System).
  12. Qiang Dong, (MSc, 2002: Workflow Simulation for International Trade).
  13. John (Ching Yi) Tsai (MSc, 2000: A comparative study of two astronomical software packages).
  14. Yale (Yuanhua) Yu (MSc, 2000: Measuring Data Cache and TLB Parameters under Linux), and co-author of a conference paper by the same title.
  15. Petrus Mursanto (MSc, 1999: Automatic Detection of Vehicular Axle Distance at Tollgates), now working at the Computer Science Department of the University of Indonesia.
  16. Douglas Low (MSc, 1998: Java Control Flow Obfuscation), primary supervisor: Christian Collberg. PhD dissertation: Network Processor Memory Hierarchy Designs for IP Packet Classification, Summer 2005, Computer Science Department of the University of Washington, advisor Jean-Loup Baer.
  17. Leon Quiding (MSc, 1999: A Formal Model and General Theory for Comparator Networks).
  18. Yi Sun, Delay optimization of carry lookahead adders using dynamic programming, Master's project, Computer Science Department, UMN-Duluth, May 1993.
  19. Xun Zhao, An interface for transforming information from TimberWolf into RanTer, Master's project, Computer Science Department, UMN-Duluth, June 1992. Zhao's project report is published as UMD-CS TR 92-02.
  20. Yanzhang Lu, Solving combinatorial optimization problems by simulated annealing, genetic algorithms, and neural networks, Master's thesis, Computer Science Department, UMN-Duluth, September 1991.
  21. Renato Milanesi, Optimal look-ahead adders, Master's thesis, Computer Science Department, UMN-Duluth, July 1991.
  22. Sree Rama Peyyety, A proposal for measurement study of Ethernet traffic, Master's project, Computer Science Department, UMN-Duluth, May 1991.
  23. Clyde Rogers, Enhancements to Ziv-Lempel data compression, Master's thesis, Computer Science Department, UMN-Duluth, May 1989.
  24. Simon Kahan, Problems in recognizing handprinted characters, Master's project, Computer Science Division, UC Berkeley, May 1985.
  25. William Zurafleff, A personal computer network via CB radio links, Master's project, Computer Science Division, UC Berkeley, May 1985.
  26. Michael Wolfe, Musical instrument pitch analyzer, Master's project, Computer Science Division, UC Berkeley, May 1983.
  27. Andy Judkis, Net Funicello: a simple microcomputer network, Master's project, Computer Science Division, UC Berkeley, May 1982.
  28. David J. Hathaway, A universal debugger for microcomputer software, Master's project, Computer Science Division, UC Berkeley, May 1982.
  29. Yi-Hsien Do, Interface the Biomation 610 Transient Recorder to the PDP 11/10 Computer, Master's project, Computer Science Division, UC Berkeley, May 1982.
Dissertation and Project Supervision (partial listing)
  1. Sejin (Eva) Choi, Persona-aware Identity Management (PIdM): Towards a framework for managing persona identity, BSc Hons Dissertation, November 2013.
  2. James Restall (BSc Hons, 2009: Threat of Return-Oriented Programming: A Roadmap to Widespread Use).
  3. David Leung, undergraduate research associate from November 2006 to March 2007.
  4. Dong Zhang, (BSc Hons dissertation, 2006, Form-Oriented Security Analysis of The WrecDirect Web Application). Primary supervisor Gerald Weber, industry mentor Barry Dowdeswell.
  5. Glenn McCord, ICT Academy project on ITBC Systems and IT Phase 1, co-supervised with Ewan Tempero, February 2006.
  6. Horace Haoqing Guo, ICT Academy project on Analysis of Development of AS2 in EDIS, February 2005. Co-supervisor: Gerald Weber. Industry mentor: Barry Dowdeswell.
  7. Jun Ho Huh, ICT Academy project on EDIS Security and Non-Repudiation, February 2005. Co-supervisor: Gerald Weber. Industry mentor: Barry Dowdeswell.
  8. Shelly Mutu-Grigg (BSc, 2003). Examining Fifth Generation Messaging Systems, project report, January 2003.
  9. Guanglun Yu, summer project on Record and Playback for Java Software Watermarking, February 2001.
  10. Hongying (Jenny) Lai, summer project on A comparative survey of Java obfuscators available on the internet, February 2001.
  11. Michael (Duc) Ta (BTech Hons, 1998: Test-bed for Distributed Object Technologies using Java). Co-supervisor: Radu Nicolescu.
  12. Terry (Tiejun) Xiao, Memory accounting system, 1998.
  13. Robert Plotkin, mrandom 3.0: An interface for pseudorandom number generators, Bachelor's thesis, Department of Electrical Engineering and Computer Science, Massachussetts Institute of Technology, May 1993.
  14. Antony P-C Ng, undergraduate research associate at UC Berkeley, 1986-87. Co-author of three papers including one at the 1986 ACM Design Automation Conference.

Externally-Funded Research (partial listing):

Recent Programme Committees

Recent Academic Service Roles