Browse By Person: Alawatugoda, Janaka
|Up a level|
Group by: Item Type | Date
Number of items: 5.
Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. In Groth, Jens (Ed.) Lecture Notes in Computer Science, Springer International Publishing, University of Oxford, Oxford, UK, pp. 277-294.
Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Protecting encrypted cookies from compression side-channel attacks. In Financial Cryptography and Data Security: 19th International Conference, FC 2015, Revised Selected Papers [Lecture Notes in Computer Science, Volume 8975], Sprinegr, San Juan, Puerto Rico, The United States of America, pp. 86-106.
Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Alawatugoda, Janaka, Boyd, Colin, & Stebila, Douglas (2014) Continuous after-the-fact leakage-resilient key exchange. In Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], Springer, Wollongong, Australia, pp. 258-273.
Alawatugoda, Janaka Araliya Bandara (2015) On the leakage resilience of secure channel establishment. PhD thesis, Queensland University of Technology.