Return to the homepage
  • Library
  • UC Online
  • News
  • Events
  • Maps
  • Staff
  • Work at UC
  • 150 Years
  • Study
    • Study
      • Courses and qualifications
      • Subjects
      • Online learning
      • Arts
      • Business
      • Digital Screen
      • Education
      • Engineering
      • Health
      • Law
      • Science
      • All departments
      • Scholarships
      • Examinations
      • Graduation
      • Graduate School
      • Key dates
      • Publications
      • Study abroad and exchanges
      • Work-Integrated Learning
      • Academic support
      • Special consideration
      • Summer School
      • Transition Programmes
      • Quick Links
      • LEARN
      • Logins
      • Timetables
      • Library
      • Scholarships
      • Transcripts
      • Grading
  • Enrol
    • Enrol at UC
      • Enrolment process
      • Enrolment and Course Dates
      • Admission and University Entrance
      • Identity and citizenship verification
      • International student enrolment
      • PhD and doctoral degree applications
      • Manage your study
      • Fees and funding
      • Student Agreement
      • Change your enrolment
      • Update your contact details
      • Contact Student Services
      • Quick Links
      • Enrol now with myUC
      • Re-enrol now with myUC
      • Qualifications and courses
      • Scholarships
      • Academic Support
      • Transcripts
  • Research
    • Research
      • Become a research student
      • Find a supervisor
      • Support for Researchers
      • Māori Research Partnerships
      • Research Impact
      • Research Institutes and Centres
      • Research specialties
      • Facilities and equipment
      • IP Commercialisation
      • Innovation Jumpstart
      • Ethics Approval
      • UC Research Awards
      • Contact us
      • Quick Links
      • Find an expert
      • Find a supervisor
      • Jobs at UC
      • Ethics Approval
      • Postgraduate forms
      • Library (research)
  • Life
    • Life
      • The campus
      • Facilities
      • Getting around
      • Student life
      • Accommodation
      • Support services
      • Know The Code
      • Sustainability Office
      • UC Students' Association (UCSA)
      • CCR
      • Golden Key
      • Health, safety and wellbeing
      • Life in CHCH
      • Life in NZ
      • Get active
      • Canterbury Card
      • Quick Links
      • UCGo
      • Maps
      • Parking
      • Health Centre
      • UC RecCentre
      • Student events
      • Clubs and societies
  • Support services
    • Support services
      • Finding support
      • Need to talk?
      • Health Services
      • Academic support
      • Assistive technology
      • Accessibility
      • Financial assistance
      • Academic grievances
      • Equity and diversity
      • Parents and whānau
      • Job and careers advice
      • New student support
      • Current student support
      • Postgraduate student support
      • High school student support
      • Adult student support
      • International student support
      • LGBTQI student support
      • Māori student support
      • Pasifika student support
      • Onsite services
      • Quick Links
      • In an emergency
      • Security
      • Raise a concern
      • IT Services
      • Academic Skills Centre
      • Library (support)
      • Contacts
      • Wellbeing Hub
  • Engage
    • Engage
      • Alumni
      • Business and industry
      • Canterbury University Press
      • Communications and Engagement
      • Community partnerships
      • External exam invigilation
      • Find an expert or consultant
      • Giving to UC
      • International partnerships
      • Knowledge Commons
      • News
      • School resources
      • Work at UC
      • Work placements
      • Quick Links
      • Donate to UC
      • Contact UC
      • Current vacancies
      • Erskine Fellowship
      • News
      • Public events
      • Liaison Office
  • About
    • About
      • What is special about UC
      • UC7
      • Ako - Learning & Teaching
      • Governance
      • Leadership
      • Health and Safety
      • Sustainability Hub
      • People and Culture
      • Asset Planning and Delivery
      • History
      • Information and Records Management
      • Ngā Uara | Our Values
      • Contacts
  • Logins
    • Logins
      • LEARN
      • Zoom
      • Student email
      • Staff email
      • myUC
      • My Timetable
      • Canterbury Card Account
      • My Library Account
      • OneDrive
      • UC CareerHub
      • UC Services Portal
      • Password Reset
      • UCGO
      • ourUC
      • Staff logins
      • More logins
Skip to main content
uc-research-profile

Use the Tab and Up, Down arrow keys to select menu items.

  • UC Research Profile
  • Search
  • Browse
    • Subject areas and disciplines
    • Colleges and departments
  • Administration
    • Email UC Research Profile Administrator
    • Update your UC Research Profile page in Profiler (Staff Only)
  • Quick Links
    • Research at UC

Associate Professor Ray Hunt

Contact

Department: Computer Science and Software Engineering

Email: ray.hunt@canterbury.ac.nz

Phone Number: +64 3 369 3999 ext. 6347

Office: Jack Erskine 347

Language: English

About
Research / Creative works

Fields of Research

  • Electronic commerce and the Internet/Intranet
  • Network protocols and architecture
  • Network security and virtual private networks
  • Digital and network forensics

Researcher Summary

Research interests include a variety of topics in the areas of network security, TCP/IP networking, wireless LANs and IP quality of service.

Subject Area: Disciplines

  • Computer Science, Information Technology, Information Sciences: Internet; Networks: Protocols, Distributed Processing and Simulation

Resources

  • Staff webpage

Research/Scholarly/Creative Works

  • Pearce M., Zeadally S. and Hunt R. (2013) Virtualization: issues, security threats, and solutions. ACM Computing Surveys 45(2) http://dx.doi.org/10.1145/2431211.2431216. (Journal Articles)
  • Hunt R. (2012) Emerging wireless personal area networks (WPANs): An analysis of techniques, tools and threats. Singapore: 18th IEEE International Conference on Networks (ICON 2012), 12-14 Dec 2012. (Conference Contributions - Other)
  • Hunt R. (2012) New developments in network forensics: Tools and techniques. Singapore: 18th IEEE International Conference on Networks (ICON 2012), 12-14 Dec 2012. (Conference Contributions - Other)
  • Hunt R. and Zeadally S. (2012) Network forensics: An analysis of techniques, tools, and trends. IEEE Computer 45(12): 36-43. http://dx.doi.org/10.1109/MC.2012.252. (Journal Articles)
  • Zeadally S., Hunt R., Chen YS., Irwin A. and Hassan A. (2012) Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommunication Systems 50(4): 217-241. http://dx.doi.org/10.1007/s11235-010-9400-5. (Journal Articles)
  • Hunt R. and Slay J. (2011) A New Approach to Developing Attack Taxonomies for Network Security - Including Case Studies. In ICON 2011: 281-286. (Conference Contributions - Published)
  • Mansoori M. and Hunt R. (2011) An ISP based notification and detection system to maximise efficiency of client honeypots in protection of end users. International Journal of Network Security & Its Applications (IJNSA) 3(5): 59-73. http://dx.doi.org/10.5121/ijnsa.2011.3505. (Journal Articles)
  • Masood M. and Hunt R. (2011) An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools. Journal of Network Forensics 3(1): 32-47. (Journal Articles)
  • Hunt R. and Shore M. (2010) Computer Security Meets Digital and Network Forensics: New Ideas in Forensically Sound Adaptive Security. Auckland, New Zealand: 15th Annual Information and IT Security Summit, 30-30 Mar 2010. (Conference Contributions - Other)
  • Hunt R. and Slay J. (2010) Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics. In PST 2010: 23-30. http://dx.doi.org/10.1109/PST.2010.5593243. (Conference Contributions - Published)
  • Hunt R. and Slay J. (2010) The Design of Real-time Adaptive Forensically Sound Secure Critical Infrastructure. In NSS 2010: 328-333. http://dx.doi.org/10.1109/NSS.2010.38. (Conference Contributions - Published)
  • Keshariya M. and Hunt R. (2010) A Proposed Policy-Based Management Architecture for Wireless Clients Operating in a Heterogeneous Mobile Environment. In Proceedings of the 8th Australian Information Security Mangement Conference: 28-41. (Conference Contributions - Published)
  • Lee I. and Hunt R. (2010) A Novel Design and Implementation of Dos-Resistant Authentication and Seamless Handoff Scheme for Enterprise WLANs. In Proceedings of The 8th Australian Information Security Management Conference: 49-61. (Conference Contributions - Published)
  • Park JH., Yang LT., Zeadally S., Woungang I., Kawsar F., Jeong YS., Cerqueira E., Fowler S., Zhang Z. and Chao HC. (2010) SH 2010: Welcome message from workshop organizers: FutureTech 2010. In 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings http://dx.doi.org/10.1109/FUTURETECH.2010.5482638. (Conference Contributions - Published)
  • Pearce M. and Hunt R. (2010) Development and Evaluation of a Secure Web Gateway Using Existing ICAP Open Source Tools. In Proceedings of the 8th Australian Information Security Mangement Conference: 102-111. (Conference Contributions - Published)
  • Pearce M., Zeadally S. and Hunt R. (2010) Assessing and improving authentication confidence management. Information Management and Computer Security 18(2): 124-139. http://dx.doi.org/10.1108/09685221011048355. (Journal Articles)
  • Wulff T. and Hunt R. (2010) New Approaches to Mitigation of Malicious Traffic in VoIP Networks. Journal of Network Forensics 2(2): 40-59. (Journal Articles)
  • Wulff T. and Hunt R. (2010) New Approaches to Mitigation of Malicious Traffic in VoIP Networks. In Proceedings of the 8th Australian Information Security Mangement Conference: 173-181. (Conference Contributions - Published)
  • Baghaei N. and Hunt R. (2009) Quality of Service Support in Mobile Multimedia Networks. In Maode M; Denko M; Zhang Y (Ed.), Wireless Quality of Service: Techniques, Standards, and Applications: 1-26. Boca Raton: Auerbach Publications. (Chapters)
  • Irwin A. and Hunt R. (2009) Forensic Methods for Detection of Deniable Encryption in Mobile Networks. In 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim09) Proceedings: 169-174. http://dx.doi.org/10.1109/PACRIM.2009.5291379. (Conference Contributions - Published)
  • Irwin D. and Hunt R. (2009) Forensic Information Acquisition in Mobile Networks. In 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing Proceedings: 163-168. http://dx.doi.org/10.1109/PACRIM.2009.5291378. (Conference Contributions - Published)
  • Rehbock S. and Hunt R. (2009) Trustworthy Clients: Extending TNC to Web-Based Environments. Computer Communications 32(5): 1006-1013. http://dx.doi.org/10.1016/j.comcom.2008.12.040. (Journal Articles)
  • Dürr M. and Hunt R. (2008) An Analysis of Security Threats to Mobile IPv6. International Journal of Internet Protocol Technology 3(2): 107-118. http://dx.doi.org/10.1504/IJIPT.2008.020468. (Journal Articles)
  • Gin A. and Hunt R. (2008) Performance analysis of evolving wireless IEEE 802.11 security architectures. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems (ACM Digital Library) IPAWN Workshop http://dx.doi.org/10.1145/1506270.1506393. (Conference Contributions - Published)
  • Kennedy T. and Hunt R. (2008) A review of WPAN security: Attacks and prevention. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems (ACM Digital Library) Security and Applications Session: 4pp. (Conference Contributions - Published)
  • Keshariya M. and Hunt R. (2008) A new architecture for performance-based policy management in heterogeneous wireless networks. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems (ACM Digital Library) IPAWN Workshop http://dx.doi.org/10.1145/1506270.1506389. (Conference Contributions - Published)
  • Lee I. and Hunt R. (2008) A Novel Design of a VoIP Firewall Proxy to Mitigate SIP-based Flooding Attacks. International Journal of Internet Protocol Technology 3(2): 128-135. http://dx.doi.org/10.1504/IJIPT.2008.020470. (Journal Articles)
  • Keshariya M. and Hunt R. (2007) Extended Policy-Based Management Framework to Provide Always Best Connected Services in Heterogeneous Mobile Environments. In Communication Systems and Networks (AsiaCSN 2007): 561-807. (Conference Contributions - Published)
  • Mathews M. and Hunt R. (2007) Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). In Communication Systems and Networks (AsiaCSN 2007): 561-806. (Conference Contributions - Published)
  • Mathews M. and Hunt R. (2007) Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2). In Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 2007: 292-297. (Conference Contributions - Published)
  • Carpinter J. and Hunt R. (2006) Tightening the net: A review of current and next generation spam filtering tools. Computers and Security 25(8): 566-578. http://dx.doi.org/10.1016/j.cose.2006.06.001. (Journal Articles)
  • Carpinter J. and Hunt R. (2006) Tightening the net: a review of current and next generation spam filtering tools. In : 19pp. (Conference Contributions - Published)
  • Hunt R. and Carpinter J. (2006) Current and New Developments in Spam Filtering. In Proceedings 2006 IEEE International Conference on Networks (ICON 2006) 2: 318-325. http://dx.doi.org/10.1109/ICON.2006.302641. (Conference Contributions - Published)
  • Hunt R. and Wong J. (2006) Security Architectures in Wireless LANs. In Boukerche A (Ed.), Handbook of Algorithms for Wireless Networking and Mobile Computing: 905-936. Boca Raton: Chapman and Hall. (Chapters)
  • Yoo K. and Hunt R. (2006) Implementation of an IPv6 multicast firewall testbed. Computer Communications 29(16): 3079-3091. http://dx.doi.org/10.1016/j.comcom.2005.11.009. (Journal Articles)
  • Gu X. and Hunt R. (2005) Wireless LAN Attacks And Vulnerabilities. In Proceedings: Networks and Communication Systems 464. (Conference Contributions - Published)
  • Hunt R. and Keshariya M. (2005) Optimised Transparent and Automated Handoff Between Wireless LANs and 3G Networks. Hong Kong: 3G World Congress, 14 Nov 2005. (Conference Contributions - Other)
  • Hunt R. and Keshariya M. (2005) Proposal for an Automated Algorithm for Optimised Handoff in Integrated Wireless Networks. In Proceedings: Networks and Communication Systems 464. (Conference Contributions - Published)
  • Keshariya M. and Hunt R. (2005) Implementation of an Integrated Secure Mobile Wireless Architecture. In Proceeding Networks and Communication Systems - 2005 464. (Conference Contributions - Published)
  • Baghaei N. and Hunt R. (2004) IEEE 802.11 Wireless LAN Security Performance Using Multiple Clients. Singapore: 12th IEEE International Conference on Networks, 17 Nov 2004. (Conference Contributions - Other)
  • Baghaei N. and Hunt R. (2004) Quality of Service in Wireless and Mobile Networks. Banff, Canada: 4th Wireless and Optical Communications Conference, 8 Jul 2004. (Conference Contributions - Other)
  • Baghaei N. and Hunt R. (2004) Review of Quality of Service Performance in Wireless LANs and 3G Multimedia Application Services. Computer Communications 27(17): 1684-1692. (Journal Articles)
  • Baghaei N. and Hunt R. (2004) Security Performance of Loaded IEEE 802.11b Wireless Networks. Computer Communications 27(17): 1746-1756. (Journal Articles)
  • Cournane A. and Hunt R. (2004) An Analysis of the Tools used for the Generation and Prevention of Spam. Computers and Security 23(2): 154-166. (Journal Articles)
  • Hansman S. and Hunt R. (2004) A Classification of Attack Methodologies for Use by CERTs. Kuala Lumpur, Malaysia: 9th Asia Pacific Internet Service Providers Conference, 23 Feb 2004. (Conference Contributions - Other)
  • Hansman S. and Hunt R. (2004) A Taxonomy of Network and Computer Attacks. Computers and Security 24(1): 31-43. (Journal Articles)
  • Hunt R. (2004) New Developments in Wireless Security. Auckland, New Zealand: 9th Annual IT Security Summit, 5 Apr 2004. (Conference Contributions - Other)
  • van den Nieuwelaar M. and Hunt R. (2004) Real-time Carrier Network Traffic Measurement, Visualisation and Topology Modelling. Computer Communications 27(1): 128-140. (Journal Articles)
  • Hunt R. (2003) Multimedia Delivery over 3G and WLAN-based IP Networks. Bangkok, Thailand: 3G World Congress, 3 Nov 2003. (Conference Contributions - Other)
  • Hunt R. (2003) Security Architectures in Wireless and Mobile Networks. NEC, Birmingham, U.K.: The European Conference on Computer-Communications - Networks 2003, 22 Jun 2003. (Conference Contributions - Other)
  • Hunt R. and Verwoerd T. (2003) Reactive Firewalls - A New Technique. Computer Communications 26(12): 1302-1317. (Journal Articles)
  • Hunt R. and Wong J. (2003) Policy Based Network Management. Taipei, Taiwan: 8th Asia Pacific Internet Service Providers Conference, 26 Feb 2003. (Conference Contributions - Other)
  • Hunt R. and Wong J. (2003) Security Architectures in Mobile and Wireless Networks. Taipei, Taiwan: 8th Asia Pacific Internet Service Providers Conference, 26 Feb 2003. (Conference Contributions - Other)
  • Hunt R., Vargo J. and Wong J. (2003) Impact of Security Architectures on Wireless Network Performance. Singapore: 5th IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2003), 27 Oct 2003. (Conference Contributions - Other)
  • Hunt R. (2002) IP Mobility and QoS Provisioning in Wireless Networks. Singapore: Proceedings of the Conference on Wireless LANs, 20 May 2002. (Conference Contributions - Other)
  • Hunt R. (2002) PKI as a Business Asset. Wellington, New Zealand: Proceedings of the 7th Annual IT Security Summit, 7 Aug 2002. (Conference Contributions - Other)
  • Hunt R. (2002) Public Key Infrastructure - Protection Through Encryption and Key Management. Sydney, Australia: Proceeding of the Conference on Information Security, 19 Aug 2002. (Conference Contributions - Other)
  • Hunt R. (2002) QoS Mechanisms in IP Networks. Bangkok, Thailand: Proceedings of the Asia Pacific Regional Internet Conference on Operational Technologies, 5 Mar 2002. (Conference Contributions - Other)
  • Hunt R. (2002) Quality of Service Mechanisms in IP-based Networks - Differentiated Services. Multilayer Switching, MPLS and Traffic Engineering. Elsevier, U.K 25(1): 100-108. (Journal Articles)
  • Hunt R. (2002) Security and Quality of Service in Wireless and Mobile Network Architectures. Hong Kong: Proceedings of the 3G World Congress, 10 Jun 2002. (Conference Contributions - Other)
  • Hunt R. (2002) Security Weaknesses in Modern TCP/IP Networks. Singapore: Proceedings of the Conference on Security Strategies for E-Government, 8 May 2002. (Conference Contributions - Other)
  • Hunt R. (2002) Understand Intrusion Detection Systems. Auckland, New Zealand: Proceedings of the IT Security 2002 Conference, 15 Jul 2002. (Conference Contributions - Other)
  • Hunt R. (2002) Frame Relay, Encyclopaedia of Information Systems. In Bidgoli H (Ed.), Encyclopaedia of Information Systems: 371-390.Academic Press. (Chapters)
  • Hunt R. (2002) TCP/IP (Transmission Control Protocol/Internet Protocol). In Bidgoli H (Ed.), Encyclopaedia of Information Systems: 489-510.Academic Press. (Chapters)
  • Hunt R. and Smith M. (2002) Network Security using NAT and NAPT. Singapore: Proceedings of the 10th IEEE International Conference on Networks, 27 Aug 2002. (Conference Contributions - Other)
  • Hunt R. and Vargo J. (2002) Network Environments, Managing. In Bidgoli H (Ed.), Encyclopaedia of Information Systems: 279-301. Maryland Heights: Academic Press. (Chapters)
  • Hunt R. and Vargo J. (2002) Voice Communication. In Bidgoli H (Ed.), Encyclopaedia of Information Systems: 633-647. Maryland Heights: Academic Press. (Chapters)
  • Hunt R. and Verwoerd T. (2002) Intrusion Detection Techniques and Approaches. Computer Communications 25(15): 1356-1365. (Journal Articles)
  • Hunt R. and Verwoerd T. (2002) Security Architecture Testing using IDS - A Case Study. Computer Communications 25(15): 1402-1412. (Journal Articles)
  • Verwoerd T. and Hunt R. (2002) Policy and Implementation of an Adaptive Firewall. Singapore: Proceedings of the 10th IEEE International Conference on Networks, 27 Aug 2002. (Conference Contributions - Other)
  • Hunt R. (2001) Building Secure VPN Architecture. Birmingham, UK: Proc. of European Conference on Networks, NEC., 1 Jun 2001. (Conference Contributions - Other)
  • Hunt R. (2001) IP Quality of Service Architectures. Bangkok, Thailand: Proceedings of the 9th IEEE International Conference on Networks, 10 Oct 2001. (Conference Contributions - Other)
  • Hunt R. (2001) PKI and Digital Certification Infrastructure. Bangkok, Thailand: Proceedings of the 9th IEEE International Conference on Networks, 10 Oct 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Providing QoS-based IP Services over DSL Networks. Sydney, Australia: Proc. of Conference on DSL and Broadband Networks., 1 Apr 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Quality of Service Broadband IP Networks. Singapore: Proceedings of Conference on Next Generation Networks, 1 May 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Re-Engineering the Internet for Broadband Quality of Service. Singapore: Proceeding of the Conference on E-Infrastructure, 5 Sep 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Securing Your Firewall. Wellington, New Zealand: Proceedings of the 6th Annual IT Security Summit, 3 Oct 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Security in Wireless and Mobile Network Architecture. Singapore: Proceedings of Conference on Wireless Internet, 1 Apr 2001. (Conference Contributions - Other)
  • Hunt R. (2001) Technological Infrastructure for PKI and Digital Certification. Computer Communications, Elsevier, U.K 24(14): 1460-1471. (Journal Articles)
  • Verwoerd T. and Hunt R. (2001) GLOB: Generic Load Balancing. Bangkok, Thailand: Proceedings of the 9th IEEE International Conference on Networks, 10 Oct 2001. (Conference Contributions - Other)
  • Hunt R. (2000) Implementing Service Infrastructure and E-Transactions. Hong Kong: Proceedings of E-Business Planning, Strategies and Implementation., 1 Sep 2000. (Conference Contributions - Other)
  • Hunt R. (2000) Quality of Service Mechanisms for IP-based Broadband Services. Hong Kong: Proceedings of the Broadband and IP Access Technologies Conference, 1 May 2000. (Conference Contributions - Other)
  • Hunt R. (2000) Security Issues in the use of TCP/IP Networks. Wellington, New Zealand: Proceedings of IPSec, 28 Mar 2000. (Conference Contributions - Other)
  • Hunt R. (2000) Technological Infrastructure for PKI and Digital Certification. NEC, Birmingham, England: Proceedings of Networks 2000. The European Conference on Computer-Communications, 1 Jun 2000. (Conference Contributions - Other)
  • Hunt R. and King A. (2000) Protocols and Architecture for Managing TCP/IP Network Infrastructures. Computer Communications, Elsevier, U.K 23(16). (Journal Articles)
  • Hunt R. (1999) ATM Implementation in New Zealand. Asian Networking Magazine 3(2): 10-17. (Journal Articles)
  • Hunt R. (1999) Evolving Technologies For New Internet Applications. IEEE Internet Computing 3(5): 16-26. (Journal Articles)
  • Hunt R. (1999) Internet 2 - Current Achievements and Future Plans. Beijing, China: International Conference on Broadband Networks and Multimedia Communications, 1 Jul 1999. (Conference Contributions - Other)
  • Hunt R. (1999) IP-based Secure VPNs and VPIs. Beijing, China: International Conference on Broadband Networks and Multimedia Communications, 1 Jul 1999. (Conference Contributions - Other)
  • Hunt R. (1999) Managing TCP/IP Network Infrastructure. NEC, Birmingham: Proceedings of Networks '99. The European Conference on Computer-Communications, 1 Jun 1999. (Conference Contributions - Other)
  • Hunt R. (1999) Public Key Infrastructure. ICM, Wellington, New Zealand: Proceedings of a Conference on Digital Certification, 1 Aug 1999. (Conference Contributions - Other)
  • Hunt R. and Harris B. (1999) Firewall Certification. Computers and Security, Elsevier, UK 18(2): 165-177. (Journal Articles)
  • Hunt R. and Harris B. (1999) Threats to TCP/IP Services. Computer Communications, Elsevier, U.K 22(10): 885-897. (Journal Articles)
  • Harris B. and Hunt R. (1998) Security threats to Internet/Intranet service. Wellington, New Zealand: Conference on Total Information Security, 1 May 1998. (Conference Contributions - Other)
  • Hunt R. (1998) Building a National Information Infrastructure - future plans, priorities and challenges. Singapore: Proc. of the ATM Forum Conference, 4 Oct 1998. (Conference Contributions - Other)
  • Hunt R. (1998) Developments in Internet Global Networking Technologies-Tag Switching, IP Switching, MPOA and RSVP. 7th IFIP/ICCC Conference on Information Networks and Data Communication, Aveiro, Portugal : 153-173. (Journal Articles)
  • Hunt R. (1998) How to build an Intranet. NEC, Birmingham: Networks '98. The European Conference on Computer Communications, 1 Jun 1998. (Conference Contributions - Other)
  • Hunt R. (1998) Internet - services, protocols and architecture. Computer Communications 20(16): 1397-1411. (Journal Articles)
  • Hunt R. (1998) Internet/Intranet Firewall Security - policy, architecture and transaction services. Computer Communications, Elsevier, U.K 21(13): 1107-1123. (Journal Articles)
  • Hunt R. (1998) Network Security. Aveiro, Portugal: 7th IFIP/ICCC Conference on Information Networks and Data Communication, Addendum I, 1 Jun 1998. (Conference Contributions - Other)
  • Hunt R. (1998) Solutions for Internet/Internet security. Wellington, New Zealand: Conference on Total Information Security, 1 May 1998. (Conference Contributions - Other)
  • Hunt R. (1997) Delivering virtual private network services on the internet: The bandwidth/performance dilemma. Singapore: 3rd Electronic Commerce Conference, 1 Nov 1997. (Conference Contributions - Other)
  • Hunt R. (1997) Internet/Intranet Security - Assessing the Available Systems for Protecting Dataflow on the Internet. Singapore: Proc of the Pan Asian Information Security Conference, 20 Jan 1997. (Conference Contributions - Other)
  • Hunt R. (1997) Intranet security. Canberra, Australia: 4th Conference on IT Security, 1 Aug 1997. (Conference Contributions - Other)
  • Hunt R. (1997) Security-issues and strategy for protecting access from the Internet. Hong Kong: Pan Asian Electronic Commerce Forum, 1 Nov 1997. (Conference Contributions - Other)
  • Hunt R. (1997) SNMP, SNMPv2 and CMIP - The Technologies for Multivendor Network Management. Computer Communications, Elsevier, U.K 20(2): 73-88. (Journal Articles)
  • Hunt R. and Vargo J. (1996) Telecommunications in Business. Irwin USA. (Authored Books)

Research Groups

  • Internet Security Group
UC Library
Research & Innovation
University of Canterbury
Private Bag 4800
Christchurch 8140
New Zealand
Research & Innovation Admin
Phone +64 3 369 5858
admin@research.canterbury.ac.nz
Research Profile Administrator
pbrfprofileradmin@canterbury.ac.nz
Back to top
  • GENERAL ENQUIRIES
  • +64 3 369 3999
  • info@canterbury.ac.nz
  • ENROLMENT ENQUIRIES
  • 0800 VARSITY (0800 827 748)
  • enrol@canterbury.ac.nz
  • INTERNATIONAL ENQUIRIES
  • +64 3 364 3443
  • (Aus) 1-800-431595
  • Ask a question
  • CONTACTS & DIRECTORIES
  • University contacts
  • Student contacts
  • Students' Association
  • Find a researcher (Research Profile)
  • Accommodation
  • Maps
  • Donate online
  • UC on Facebook
  • UC on Twitter
  • UC on youTube
  • UC on Instagram
  • UC on Snapchat
  • UC on LinkedIn
  • UC on WeChat
  • DEPARTMENTS
  • All departments
  • Arts
  • Business
  • Education
  • Engineering
  • Health
  • Law
  • Science
  • Service areas
  • LATEST
  • News
  • Events
  • Publications
  • Work at UC
  • Info for media
  • Style Guide
  • TOOLS
  • LEARN
  • UC Policy Library
  • Library
  • myUC
  • IT account
  • Student email
  • OneDrive
  • Timetable
  • Staff email
  • Intranet (Staff)
  • Copyright Feedback Privacy Cookies Declaration Payment Data
  • Emergency Information
  • © University of Canterbury - A Fair Trade University