1. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In : IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticle

  2. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In : LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticle

  3. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In : Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticle

  4. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In : International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticle

  6. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In : Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticle

  10. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  20. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  23. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  24. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...6 7 8 9 10 11 12 13 ...83 Next