Accessibility Skip to Global Navigation Skip to Local Navigation Skip to Content Skip to Search Skip to Site Map Menu

Hank Wolfe

BSc(Am Uni Wash DC), PhD(Otago), FNZCS

Position
Associate Professor
Room
9.09, Commerce Building
Phone
+64 3 479 8141
Email
hank.wolfe@otago.ac.nz
Supervising
Tom Laurenson
Papers
2017 SS: COMP111
2017 S1: COMP101, BSNS115, COMP111, COMP210, FORS201
2017 S2: BSNS115, COMP210, COMP111

Associate Professor Henry B. Wolfe (Hank) has been an active computer professional for more than 50 years and has specialised in computer security. During that period he has earned an international reputation in the field of electronic forensics, encryption, surveillance, privacy and computer virus defences. He has provided advice on security matters to major government bodies within New Zealand and to Australian, Panamanian, Singaporean and U.S. Government organizations; and additionally to New Zealand businesses and the major New Zealand Internet Service Providers. Over the past twenty-five or so years he has conducted and supervised 175 computer security audits of New Zealand businesses and government bodies. Dr Wolfe speaks on security and privacy issues (both technical and policy) regularly at national and international conferences. His primary research interest is the discipline of electronic forensics and surveillance. In addition he has an interest in private communications techniques, which focus on the implementation of various cryptographic algorithms that are currently available and the associated hardware and software necessary to implement such systems.

Publications

Gee, H., Laurenson, T., & Wolfe, H. (2015). Improving the detection and validation of inland revenue numbers. Proceedings of the 13th Australian Digital Forensics Conference. (pp. 62-69). Perth, Australia: Edith Cowan University. doi: 10.4225/75/57b3f6edfb88a

Laurenson, T., MacDonell, S., & Wolfe, H. (2015). Towards a standardised strategy to collect and distribute application software artifacts. Proceedings of the 13th Australian Digital Forensics Conference. (pp. 54-61). Perth, Australia: Edith Cowan University. doi: 10.4225/75/57b3f5cffb889

Wolfe, H. B. (2015, November). Another point of view. Verbal presentation at the Centre for Organisational Performance Measurement & Management (COPMM) Symposium: Big Data and Organisational Performance, Dunedin, New Zealand. Retrieved from http://www.otago.ac.nz/copmm/symposiums/otago619689.html

Janczewski, L. J., Wolfe, H. B., & Shenoi, S. (Eds.). (2013). Security and Privacy Protection in Information Processing Systems: Proceedings of the 28th International Federation for Information Processing (IFIP TC 11) International Conference. Heidelberg, Germany: Springer. 436p.

Roberts, D., & Wolfe, H. B. (2011). Data remanence in New Zealand: 2011. In A. Woodward & C. Valli (Eds.), Proceedings of the 9th Australian Digital Forensics Conference. (pp. 110-115). Joondalup, Australia: Edith Cowan University.

Authored Book - Other

Wolfe, H. B., & Quinn, S. (2004). Voyage of discovery: Computing for end-users (No. 2, 8th ed.). Dunedin, New Zealand: Alpha-Omega Group, 84p.

Wolfe, H. B., & Quinn, S. (2004). Voyage of discovery: Computing for end-users (No. 1, 8th ed.). Dunedin, New Zealand: Alpha-Omega Group, 84p.

^ Top of page

Chapter in Book - Research

Wolfe, H. B. (2010). A history of ICT: Selected highlights. In J. Toland (Ed.), Return to tomorrow: 50 years of computing in New Zealand. (pp. 25-37). Wellington, New Zealand: New Zealand Computer Society.

Wolfe, H. B. (2000). Internet and Intranet Security, Management, Risks and Solutions. In L. J. Janczewski (Ed.), Cryptography: Protecting Confidentiality, Integrity and Availability of Data. Hershey, PA: Idea Group Publishing.

^ Top of page

Journal - Research Article

Wolfe, H. B. (2010). Mobile phone security: An update. TSCM Journal, 1(3), 1-14.

Wolfe, H. (2004). Penetrating encrypted evidence. Digital Investigation, 1(2), 102-105.

Wolfe, H. B. (2002). Non-cryptanalytic attacks. Cryptologia, XXVI(3), 222-235.

Wolfe, H. B. (2001). Using Computer Forensic Techniques in Your Practice. Technology Law Forum, 1(4), 45-47.

Wolfe, H. B. (2001). Using Computer Data Encryption Techniqus in Your Practice. Technology Law Forum, 1(6), 77-80.

Wolfe, H. B. (2000). Discovery in a Computer World. Technology Law Forum, 1(3), 33-37.

Wolfe, H. B. (1997). Privacy Enhancing Technology. Computer Fraud & Security Bulletin, 11-15.

^ Top of page

Journal - Research Other

Wolfe, H. (2007). [Review of the book Securing IM and P2P applications for the enterprise]. Digital Investigation, 4, 46-47.

Wolfe, H. (2007). [Review of the book Cisco wireless LAN security]. Digital Investigation, 4, 46.

Wolfe, H. B. (2006). [Review of the book The official EnCE: EnCase Certified Examiner: Study Guide]. Digital Investigation, 3, 103-104.

^ Top of page

Journal - Professional & Other Non-Research Articles

Wolfe, H. B. (2006). [Review of the book RFID Security]. Digital Investigation, 3, 181-182.

Wolfe, H. B. (2006). An introduction to surveillance. Employment Law Bulletin, Feburary(1), 3-7.

Wolfe, H. (2004). KISS - Keep it simple stupid. Computer Fraud & Security, (May), 11.

Wolfe, H. (2004). Computer security for fun and profit. Computer Fraud & Security, (April), 4-5.

Wolfe, H. (2004). The question of organizational forensic policy. Computer Fraud & Security, (June), 13-14.

Wolfe, H. B. (2003). Setting up an electronic evidence forensics laboratory. Computers & Security, 22(8), 670-672.

Wolfe, H. B. (2003). Evidence analysis. Computers & Security, 22(4), 289-291.

Wolfe, H. B. (2003). Forensic evidence testimony - some thoughts. Computers & Security, 22(7), 577-579.

Wolfe-Wilson, J., & Wolfe, H. B. (2003). Management strategies for implementing forensic security measures. Information Security Technical Report, 8(2), 55-64.

Wolfe, H. B. (2003). Evidence acquisition. Computers & Security, 22(3), 193-195.

Wolfe, H. B. (2003). Presenting the evidence report. Computers & Security, 22(6), 479-481.

More publications...