QUT ePrints

Browse By Person: Choo, Kim-Kwang

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 13.

Journal Article

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2006) The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications, 29(15), pp. 2788-2797.
Number of full-text downloads 561
Number of citations in Scopus 13
Number of citations in Web of Science® 11

Boyd, Colin A., Choo, Kim-Kwang Raymond, & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. Lecture Notes in Computer Science, 4058, pp. 371-382.
Number of full-text downloads 322
Number of citations in Scopus 2
Number of citations in Web of Science® 4

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Errors in Computational Complexity Proofs for Protocols. Lecture Notes in Computer Science, 3788/2005.
Number of full-text downloads 451
Number of citations in Scopus 37
Number of citations in Web of Science® 42

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788/2005, pp. 585-604.
Number of full-text downloads 606
Number of citations in Scopus 70
Number of citations in Web of Science® 60

Choo, Kim-Kwang R., Boyd, Colin, Hitchcock, Yvonne, & Maitland, Greg M. (2005) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Lecture Notes in Computer Science, 3352, pp. 352-367.
Number of full-text downloads 356
Number of citations in Scopus 3
Number of citations in Web of Science® 8

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) On Session Key Construction in Provably-Secure Key Establishment Protocols. Lecture Notes in Computer Science, 3715, pp. 116-131.
Number of full-text downloads 151
Number of citations in Scopus 13
Number of citations in Web of Science® 16

Conference Paper

Du, Rong, Foo, Ernest, Boyd, Colin A., & Choo, Kim-Kwang R. (2006) Formal analysis of secure contracting protocol for E-Tendering. In Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 16 - 19 Jan 2006, Hobart, Australia.
Number of full-text downloads 234
Number of citations in Scopus 2

Tang, Qiang & Choo, Kim-Kwang R. (2006) Secure Password-based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. In Zhou, Jianying & Yung, Moti (Eds.) 4th International Conference on Applied Cryptography and Network Security (ACNS'06), 6~9 June 2006, Singapore.
Number of full-text downloads 492
Number of citations in Scopus 4
Number of citations in Web of Science® 6

Ring, Jared W., Cho, Kim-Kwang R., Foo, Ernest, & Looi, Mark H. (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. In Clark, Andrew, McPherson, Mark, & Mohay, George (Eds.) AusCERT Asia Pacific Information Technology Security Conference 2006, 23 May 2006, Gold Coast, Australia.
Number of full-text downloads 757

Choo, Kim-Kwang R., Boyd, Colin A., Hitchcock, Yvonne, & Maitland, Greg M. (2005) Complementing Computational Protocol Analysis with Formal Specifications. In Dimitrakos, Theo & Martinelli, Fabio (Eds.) IFIP TC1 WG1.7 Second International Workshop on Formal Aspects in Security and Trust - FAST 2004, 26 - 27 August, Toulouse, France.
Number of full-text downloads 183

Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Cheung, W & Hsu, J (Eds.) Proceedings: The 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service, 29 March - 1 April, 2005, China, Hong Kong.
Number of citations in Scopus 1

Choo, Kim-Kwang R. & Hitchcock, Yvonne (2005) Security Requirement for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Boyd, Colin & Gonzalez-Nieto, Juan Manuel (Eds.) 10th Australasian Conference on Information Security and Privacy - ACISP 2005, 4-6 July 2005, Brisbane, Australia.
Number of full-text downloads 434
Number of citations in Scopus 3

QUT Thesis

Choo, Kim-Kwang Raymond (2006) Key establishment : proofs and refutations. PhD thesis, Queensland University of Technology.
Number of full-text downloads 915

This list was generated on Sat Nov 22 07:11:15 2014 EST.