Browse By Person: Alawatugoda, Janaka

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 5.

Conference Paper

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. In Groth, Jens (Ed.) Lecture Notes in Computer Science, Springer International Publishing, University of Oxford, Oxford, UK, pp. 277-294.
Number of full-text downloads 4

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Protecting encrypted cookies from compression side-channel attacks. In Financial Cryptography and Data Security: 19th International Conference, FC 2015, Revised Selected Papers [Lecture Notes in Computer Science, Volume 8975], Sprinegr, San Juan, Puerto Rico, The United States of America, pp. 86-106.
Number of full-text downloads 83
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Number of full-text downloads 72
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Alawatugoda, Janaka, Boyd, Colin, & Stebila, Douglas (2014) Continuous after-the-fact leakage-resilient key exchange. In Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], Springer, Wollongong, Australia, pp. 258-273.
Number of full-text downloads 64
Number of citations in Scopus 3
Number of citations in Web of Science® 4

QUT Thesis

Alawatugoda, Janaka Araliya Bandara (2015) On the leakage resilience of secure channel establishment. PhD thesis, Queensland University of Technology.
Number of full-text downloads 86

This list was generated on Mon Apr 24 16:56:24 2017 AEST.