Browse By Person: Bartlett, Harry

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 31.

Book Chapter

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2015) Flaws in the initialisation process of stream ciphers. In Daras, Nicholas & Rassias, Michael (Eds.) Computation, Cryptography, and Network Security. Springer International Publishing, Cham, Switzerland, pp. 19-49.

Journal Article

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry (2015) CHURNs : freshness assurance for humans. The Computer Journal, 58(10), pp. 2404-2425.
Number of full-text downloads 30
Number of citations in Web of Science® 1

Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 137
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 44

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry (2013) Security analysis of linearly filtered NLFSRs. Journal of Mathematical Cryptology, 7(4), pp. 313-332.

Bellet, R. Nicole, Francis, Rebecca L, Jacob, Justin S, Healy, Karen M, Bartlett, Harold John Gregory, Adams, Lewis, et al. (2013) Timed Up and Go Tests in cardiac rehabilitation : reliability and comparison with the 6-minute walk test. Journal of Cardiopulmonary Rehabilitation & Prevention, 33(2), pp. 99-105.
Number of citations in Scopus 9
Number of citations in Web of Science® 9

Kelly, Mark D., Gibson, Abby, Bartlett, Harry, Rowling, Diane, & Patten, John (2013) Tenofovir-associated proteinuria. AIDS, 27(3), pp. 479-481.
Number of full-text downloads 38
Number of citations in Scopus 10
Number of citations in Web of Science® 8

Hansen, Kim, Thom, Ogilvie, Rodda, Hamish, Price, Melanie, Jackson, Chris, Bennetts, Scott, et al. (2012) Impact of pain location, organ system and treating speciality on timely delivery of analgesia in emergency departments. EMA - Emergency Medicine Australasia, 24(1), pp. 64-71.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Haerer, Wendy, Delbaere, Kim, Bartlett, Harry, Lord, Stephen, & Rowland, Jeffrey (2011) Relationships between HMG-CoA reductase inhibitors (statin) use and strength, balance and falls in older people. Internal Medicine Journal, Online(Online), pp. 1-17.
Number of citations in Scopus 13
Number of citations in Web of Science® 13

Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al. (2011) Repeated six-minute walk tests for outcome measurement and exercise prescription in outpatient cardiac rehabilitation: A longitudinal study. Archives of Physical Medicine and Rehabilitation, 92(9), pp. 1388-1394.
Number of citations in Scopus 10
Number of citations in Web of Science® 7

Lewis, Peter A., Bartlett, Harry, Townsend, Shane, Courtney, Mary D., Mullany, Daniel V., & Coyer, Fiona M. (2011) A prospective pilot study evaluating the ‘cardiac decompensation score’ in the setting of intraaortic balloon counterpulsation. Intensive and Critical Care Nursing, 27(1), pp. 31-36.
Number of full-text downloads 98

Strugnell, Wendy, Hamilton-Craig, Christian, Parry, Temeeka, Bartlett, Harry, & Slaughter, Richard (2010) Cardiac MRI is Superior to Gated Blood Pool Imaging in the Assessment of Left Function in Patients Post-cardiac Transplantation. Heart, Lung and Circulation, 19(7), pp. 400-405.
Number of citations in Scopus 1

Fukushima, Satsuki, Tesar, Peter, Jalali, Homayoun, Clarke, Andrew, Sharma, Hemant, Choudhary, Jivesh, et al. (2010) Determinants of in-hospital and long-term surgical outcomes after repair of postinfarction ventricular septal rupture. The Journal of Thoracic and Cardiovascular Surgery, 140(1), pp. 59-65.
Number of citations in Scopus 13
Number of citations in Web of Science® 12

Bartlett, Harold, Riley, Robyn, Slaughter, Richard, Strugnell, Wendy, & Trotter, Andrew (2005) Modified RV Short Axis Series - A New Method for Cardiac MRI Measurement of Right Ventricular Volumes. Journal of Cardiovascular Magnetic Resonance, 7(5), pp. 769-774.
Number of citations in Scopus 37
Number of citations in Web of Science® 29

Conference Paper

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward P., & Wong, Kenneth Koon-Ho (2016) Tweaking generic OTR to avoid forgery attacks. In Batten, L. & Li, G. (Eds.) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, Springer, Cairns, Qld, pp. 41-53.
Number of full-text downloads 12

Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2016) Investigating cube attacks on the authenticated encryption stream cipher ACORN. In International Conference on Applications and Techniques in Information Security (ATIS 2016), 26-28 October 2016, Cairns, Qld.

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Kenneth Koon-Ho, Wong (2016) Forgery attacks on ++AE authenticated encryption mode. In ACSW '16 Proceedings of the Australasian Computer Science Week Multiconference, ACM, Canberra, A.C.T.
Number of full-text downloads 38

Salam, Md Iftekhar, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef (2016) Finding state collisions in the authenticated encryption stream cipher ACORN. In ACSW '16 Australasian Computer Science Week, 2 - 5 February 2016, Canberra, A.C.T.

Di, Binbin, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2015) Correcting flaws in Mitchell’s analysis of EPBC. In Welch, Ian & Yi, Xun (Eds.) Proceedings of the 13th Australasian Information Security Conference, Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 57-60.
Number of full-text downloads 35

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC, pp. 220-233.

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 53

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 111

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 162
Number of citations in Scopus 1

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 95

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 92
Number of citations in Scopus 1

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.
Number of citations in Scopus 1

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 121
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth , Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 90

QUT Thesis

Bartlett, Harold John Gregory (1998) Reliability analysis with suspended items. PhD thesis, Queensland University of Technology.
Number of full-text downloads 41

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 221

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 68

This list was generated on Thu Apr 27 19:19:25 2017 AEST.