QUT ePrints

Browse By Person: Dawson, Edward

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 1991 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
Number of items: 144.

1991

Dawson, Edward Pyle (1991) Design and cryptanalysis of symmetric ciphers. PhD thesis, Queensland University of Technology.

2000

Golic, Jovan Dj, Clark, Andrew J., & Dawson, Edward P. (2000) Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers, 49(10), pp. 1100-1109.
Number of full-text downloads 180
Number of citations in Scopus 18
Number of citations in Web of Science® 13

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 186
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 265

2001

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapali (2001) An Analysis of Integrity Services in Protocol. In Progress in Cryptology - INDOCRYPT 2001, 16-20 December 2001.

Boyd, Colin, Dawson, Edward, Kim, Jung-Joon, & Park, Dong-Gook (2001) Cryptographic Salt: A Countermeasure Against Denial-Of-Service Attacks. In Information Security and Privacy - ACISP 2001 (LNCS 2119), 11-13 July 2001.

Burnett, Linda, Carter, Gary, Dawson, Edward, & Millan, William (2001) Efficient Methods for Generating MARS-Like S-Boxes. In New York, U (Ed.) Fast Software Encryption, 10-12 April 2000.

Simpson, Leonie R., Dawson, Edward P., Golic, Jovan D.J., & Millan, William L. (2001) LILI Keystream Generator. In Selected Areas of Cryptography, 7th Annual International Workshop, SAC 2000, 14-15 August 2000, Ontario, Canada.
Number of full-text downloads 160

Boyd, Colin, Dawson, Edward, & Park, Dong-Gook (2001) Micropayments for Wireless Communications. In Information Security and Cryptology - ICISC 2000, 8-9 December 2000.

Boyd, Colin, Dawson, Edward, & Gonzalez-Nieto, Juanma (2001) A Public Key Cryptosystem Based on the Subgroup Membership Problem. In Information and Communications Security, 13-16 November 2001.

Dawson, Edward, Golic, Jovan, & Simpson, Leonie (2001) A Survey of Divide and Conquer Atacks on Certain Irregularly Clocked Stream Ciphers. In Cryptography And Computational Number Theory. Birkhauser Verlag, Basel, Switzerland, pp. 165-186.

2002

Dawson, Edward P., Viswanathan, Kapaleeswaran, & Boyd, Colin A. (2002) Compliant cryptologic protocols. International Journal of Information Security, 1(3), pp. 189-202.

Dawson, Edward P. & Simpson, Leonie R. (2002) Analysis and Design Issues for Synchronous Stream Ciphers. In Niederreiter, Harald (Ed.) Coding Theory and Cryptology. Singapore University Press World Scientific, Singapore, pp. 49-90.

Dawson, Edward, Fuller, Joanne, & Millan, William (2002) Efficient Algorithms for Analysis of Cryptographic Boolean Functions. In Billington,, Donovan,, & Khodkar, (Eds.) 13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 7-10 July, 2002, Fraser Island, Queensland.

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2002) Hybrid Key Escrow: A New Paradigm. Computers & Security, 21(1), pp. 77-100.

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Clark, Andrew J., Fuller, Joanne E., Golic, Jovan Dj, Dawson, Edward P., Lee, Hoon-Jae, Millan, William L., et al. (2002) The LILI-II Keystream Generator. In 7th Australian Conference on Information Security and Privacy, 3-5 July 2002, Melbourne, Victoria.
Number of full-text downloads 371
Number of citations in Web of Science® 16

Coulter, Robert, Dawson, Edward, Henderson, Marie, & Okamoto, Eiji (2002) Modelling trust structures for public key infrastructures. In Batten, & Seberry, (Eds.) LNCS 2384 Information Security and Privacy - Proceedings of the 7th Austalasian Conference (ACISP'02), 3-5 July, 2002, Melbourne, Victoria.
Number of citations in Web of Science® 4

Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2002) A New Design of Privilege Management Infrastructure for Organisations Using Outsourced PKI. In Chan, A & Gligor, V (Eds.) Information Security (ISC 2002), 30 Sept - 2 Oct, 2002, Sao Paulo, Brazil.

Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2002) Robust, Privacy Protecting, and Publicly Verifiable Sealed-bid Auction. In Deng,, Qing,, Boo,, & Zhou, (Eds.) Information and Communications Security (ICICS'02), 9-12 December, 2002, Singapore.
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) A Self-Escrowed Integer Factorisation Based Public Key Infrastructure. In Gonzalez, & Martinez, (Eds.) VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 5-7 September, 2002, Asturias, Spain.

Dawson, Edward, Golic, Jovan, & Salmasizadeh, Mahmoud (2002) Statistical Weakness in Multiplexed Sequences. Finite Fields and Their Applications, 8(4), pp. 420-433.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Carter, Gary, Dawson, Edward, Henricksen, Matthew, May, Lauren, & Millan, William (2002) Strengthening the Key Schedule of the AES. In Batten, & Seberry, (Eds.) Information Security and Privacy (ACISP 02), 3-5 July, 2002, Melbourne.
Number of citations in Web of Science® 6

2003

Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2003) BAAI: Biometric Authentication and Authorization Infrastructure. In ITRE2003, 11-13 August, 2003, Newark, NJ, USA.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) Evolutionary Generation of Bent Functions for Cryptography. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003 Proceedings Vol.3, 8-12 December, 2003, Canberra, Australian Capital Territory.
Number of citations in Scopus 2

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Five Sealed-Bid Auction Models. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 31

Clark, Andrew, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) Implementing an Efficient Elliptic Curve Cryptosystem over $GF(p)$ on a Smart Card. The ANZIAM Journal, 44(April 2003), pp. 354-377.

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) New Concepts on Evolutionary Search for Boolean Functions in Cryptology. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003, Proceedings Volume 3, 8-12 December, 2003, Canberra, Australian Capital Territory.

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Non-Interactive Auction Scheme with Strong Privacy. In Lee, P & Lim, C (Eds.) Information Security and Cryptology - ICISC 2002, 28-29 November 2002, Seoul, Korea.
Number of full-text downloads 61
Number of citations in Scopus 3

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 475
Number of citations in Web of Science® 2

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2003) Secure E-Voting for Preferential Elections. In Traunmuller, R (Ed.) Eectronic Government - EGOV 2003, September, 2003, Prague, Czech Republic.
Number of full-text downloads 111
Number of citations in Scopus 2
Number of citations in Web of Science® 3

Carter, Gary, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) The Security of Fixed versus Random Elliptic Curves in Cryptography. In Safavi-Naini, R & Seberry, J (Eds.) Information Security and Privacy - ACISP 2003 (LNCS 2727), 9-11 July 2003, Wollongong, New South Wales.

Dawson, Edward, Lopez, Javier, Okamoto, Eiji, & Russell, Selwyn (2003) Virtual Certificates And Synthetic Certificates: New Paradigms For Improving Public Key Validation. Computer Communications, 26(16), pp. 1826-1838.
Number of citations in Scopus 8
Number of citations in Web of Science® 5

2004

Hitchcock, Yvonne R., Montague, Paul, Carter, Gary P., & Dawson, Edward P. (2004) The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. International Journal of Information Security, 3(2), pp. 86-98.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. In Jakobsson, M, Yung, M, & Zhou, J (Eds.) Applied Cryptography and Network Security Second International Conference on Applied Cryptography and Network Security (LNCS 3089), 8 - 11 June 2004, Yellow Mountain, China.
Number of full-text downloads 131
Number of citations in Scopus 6
Number of citations in Web of Science® 11

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) A Correct, Private and Efficient Mix Network. In Boa, F, Deng, R, & Zhou, J (Eds.) Publick Key Cryptography - PKC 2004. Seventh International Workshop on Theory and Practice in Public Key Cryptography., 1-4 March 2004, Singapore.
Number of full-text downloads 64
Number of citations in Scopus 14
Number of citations in Web of Science® 19

Dawson, Edward & Wu, Chuan (2004) Correlation Immunity and Resiliency of Symmetric Boolean Functions. Theorectical Computer Science Journal, 312(2), pp. 321-335.
Number of citations in Scopus 12
Number of citations in Web of Science® 7

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. In Chae, K & Yung, M (Eds.) Information Security Applications. Fourth International Workshop, WISA 2003., 25-27 August 2003, Jeju Island, Korea.
Number of full-text downloads 57
Number of citations in Scopus 1

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. In Trust and Privacy in Digital Business, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 17
Number of citations in Web of Science® 10

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) Implementation Issues in Secure E-Voting Schemes. In Kozan, E (Ed.) Proceedings of Abstracts and Papers (On CD-Rom) of the Fifth Asia-Pacific Industrial Engineering and Management Systems (APIEMS) Conference 2004 and the Seventh Asia-Pacific Division Meeting of the International Foundation of Production Research, 12-15 December 2004, Gold Coast, Australia.
Number of full-text downloads 210

Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Number of full-text downloads 254

Dawson, Edward, Foo, Ernest, Peng, Kun, & Yao, Ming (2004) An Improved Forward Integrity Protocol for Mobile Agents. In Chae, K & Yung, M (Eds.) Information Security Applications. 4th International Workshop, WISA 2003, August 2003, Jeju Island, Korea.
Number of citations in Scopus 7

Bani Hammad, Yousef, Carter, Gary, Dawson, Edward, & Hitchcock, Yvonne (2004) Improvements to the RAK Factoring Algorithm. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Maitland, Gregory, & Yao, Minna (2004) A Mobile Agent System Providing Offer Privacy. In Wang,, Pieprzyk,, & Varadharajan, (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Dawson, Edward, Fuller, Joanne, & Millan, William (2004) Multi-Objective Optimisation of Bijective S-Boxes. In Greenwood, G (Ed.) Proceedings of the 2004 Congress on Evolutionary Computation (CEC2004), 19-23 June 2004, Portland, United States.
Number of citations in Scopus 4

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Multiplicative Homomorphic E-Voting. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. 5th International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 479
Number of citations in Scopus 15
Number of citations in Web of Science® 12

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) A New Security Architecture for Protecting the Dynamic Component of Mobile Agents. In Mohammadian, (Ed.) International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2004), 12 - 14 July 2004, Gold Coast, Australia.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. In Katsikas, Sokratis, Lopez, Javier, & Pernul, Gunther (Eds.) Trust and Privacy in Digital Business. First International Conference, TrustBus 2004, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Providing Receipt-Freeness In Mixnet-Based Voting Protocols. In Proceedings of the 6th International Conference on Infomation Security and Cryptology - ICISC 2003, 27-28 November 2003, Seoul, Korea.
Number of citations in Scopus 21
Number of citations in Web of Science® 3

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Secure Key Issuing in ID-Based Cryptography. In Hogan,, Montague,, Purvis,, & Steketee, (Eds.) ACSW Frontiers 2004, Proceedings of the Australian Information Security Workshop (AISW2004), January 2004, Dunedin, New Zealand.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) A Secure and Efficient Mix-Network Using Extended Binary Mixing Gate. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, Australia.
Number of full-text downloads 24

Burnett, Linda, Clark, Andrew, Dawson, Edward, & Millan, William (2004) Simpler Methods for Generating Better Boolean Functions with Good Cryptographic Properties. The Australasian Journal of Combinatorics, 29, pp. 231-247.
Number of citations in Scopus 3

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Peng, Kun, & Yao, Minna (2004) Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. In Bauknecht, Kurt, Bichler, Martin, & Proll, Birgit (Eds.) E-Commerce and Web Technologies - EC-Web 2004. Fifth International Conference Proceedings., 31 August - 3 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

2005

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 2

Dawson, Ed, Christensen, Sharon, Duncan, William, Black, Peter J., Ernest Foo, Ernest, & Du, Rong (2005) Security and legal issues in E-tendering. CRC for Construction Innovation, Brisbane.
Number of full-text downloads 126

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 189
Number of citations in Scopus 3
Number of citations in Web of Science® 6

Agudo, Isaac, Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005, July 2005, Greece, Samos Island.

Chen, Kevin, Henricksen, Matthew P., Millan, William L., Fuller, Joanne, Simpson, Leonie, Dawson, Edward, et al. (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2004), 3506, pp. 33-50.
Number of full-text downloads 137
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 146
Number of citations in Scopus 3

Fuller, Joanne, Millan, William, & Dawson, Edward (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing: computing paradigms and computational intelligence, 23(3), pp. 201-218.
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 117
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 37
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 71
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Peng, Kun, Boyd, Colin A., & Dawson, Edward P. (2005) Simple and Efficient Shuffling with provable Correctness and ZK Privacy. Lecture Notes in Computer Science, pp. 188-204.
Number of full-text downloads 76
Number of citations in Web of Science® 20

Dawson, Edward, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Vivas, Jose (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

2006

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Number of full-text downloads 1,187

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

Betts, Martin, Black, Peter, Christensen, Sharon A., Dawson, Edward, Du, Rong, Duncan, William, et al. (2006) Towards secure and legal e-tendering. Journal of Information Technology in Construction, 11, pp. 89-102.
Number of full-text downloads 1,158
Number of citations in Scopus 7

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 71
Number of citations in Scopus 13
Number of citations in Web of Science® 10

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Dawson, Edward & Henricksen, Matthew (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 64

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 128
Number of citations in Scopus 1

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 20
Number of citations in Scopus 2
Number of citations in Web of Science® 14

Dawson, Edward & Henricksen, Matthew (2006) Rekeying Issues in the MUGI Stream Cipher. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of full-text downloads 101
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 245
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 34

2007

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Number of full-text downloads 776

Burdon, Mark, Gonzalez Nieto, Juan M., Christensen, Sharon A., Dawson, Edward P., Duncan, William D., & Lane, Bill B. (2007) Access Control in Federated Databases: How Legal Issues Shape Security. In Wimmer, Maria A., Scholl, Jochen, & Gronlund, Ake (Eds.) Electronic Government, 6th International Conference, EGOV 2007, 3-7 September, Regensburg, Germany.
Number of full-text downloads 55

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Pham, Quan, McCullagh, Adrian J., & Dawson, Edward P. (2007) Consistency of user attribute in federated systems. In Lambrinoudakis, Costas, Pernul, Gunther, & Min Tjoa, A. (Eds.) Lecture Notes in Computer Science, Springer, Regensburg, Germany, pp. 165-177.
Number of full-text downloads 114
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Peng, Kun & Dawson, Edward P. (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. In Dawson, Edward P. & Wong, Duncan S. (Eds.) Third International Conference, ISPEC 2007: Information Security Practice and Experience, May 7-9, 2007, Hong Kong, China.
Number of full-text downloads 73
Number of citations in Scopus 9
Number of citations in Web of Science® 8

Hisil, Huseyin, Carter, Gary P., & Dawson, Edward P. (2007) New Formulae for Efficient Elliptic Curve Arithmetic. Progress in Cryptology – INDOCRYPT 2007 (LNCS), 4859, pp. 138-151.
Number of full-text downloads 594
Number of citations in Scopus 18
Number of citations in Web of Science® 11

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 214
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Peng, Kun & Dawson, Edward P. (2007) A range test secure in the active adversary model. In Brankovic, L. & Steketee, C. (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Victoria.
Number of full-text downloads 54

2008

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'Aba, Muhammad (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 14
Number of citations in Web of Science® 14

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Number of full-text downloads 48

Bao, Feng, Dawson, Ed, & Peng, Kun (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 27
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2008) Twisted Edwards curves revisited. Lecture Notes in Computer Science, LNCS 5350, pp. 326-343.
Number of citations in Scopus 29
Number of citations in Web of Science® 16

2009

Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.

Teo, Sui-Guan, Al-Mashrafi, Mufeed, Simpson, Leonie R., & Dawson, Edward (2009) Analysis of authenticated encryption stream ciphers. In Proceedings (Abstracts and Papers) of the 20th National Conference of Australian Society for Operations Research, Australian Society for Operations Research Inc, Gold Coast.
Number of full-text downloads 400

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35(1), pp. 49-53.
Number of citations in Scopus 27
Number of citations in Web of Science® 11

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Faster group operations on elliptic curves. In Information Security 2009 : proceedings of the 7th Australasian Information Security Conference, CRPIT/Springer, Wellington, New Zealand, pp. 11-19.
Number of full-text downloads 72
Number of citations in Scopus 5

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Jacobi quartic curves revisited. Lecture Notes in Computer Science, LNCS 5594, pp. 452-468.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Number of full-text downloads 72
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Number of full-text downloads 92
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software, 82(2), pp. 270-273.
Number of citations in Scopus 43
Number of citations in Web of Science® 23

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers and Electrical Engineering, 35(1), p. 9.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

2010

Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Number of full-text downloads 337
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Number of full-text downloads 270

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Number of full-text downloads 126

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 146

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research, 2(1), pp. 27-37.
Number of full-text downloads 119

Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 169

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 170

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 353

2011

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 80

Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Number of full-text downloads 64

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Number of full-text downloads 134
Number of citations in Scopus 5

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 96
Number of citations in Scopus 1

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2011) An exploration of affine group laws for elliptic curves. Journal of Mathematical Cryptology, 5(1), pp. 1-50.

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 69

Peng, Kun, Dawson, Ed, & Bao, Feng (2011) Modification and optimisation of a shuffling scheme : stronger security, formal analysis and higher efficiency. International Journal of Information Security, 10(1), pp. 33-47.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 60

Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Number of full-text downloads 92

2012

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 53

Skandhakumar, Nimalaprakasan, Salim, Farzad, Reid, Jason F., & Dawson, Edward (2012) Physical access control administration using building information models. Lecture Notes in Computer Science : Cyberspace Safety and Security, 7672, pp. 236-250.
Number of full-text downloads 19

Skandhakumar, Nimalaprakasan, Reid, Jason F., Dawson, Ed, Drogemuller, Robin, & Salim, Farzad (2012) An authorization framework using building information models. The Computer Journal, 55(10), 1244 -1264.
Number of full-text downloads 57
Number of citations in Scopus 2

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 50

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Number of full-text downloads 69

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Chuah, Chai Wen, Dawson, Edward, Gonzalez Nieto, Juan Manuel, & Simpson, Leonie (2012) A framework for security analysis of key derivation functions. Lecture Notes in Computer Science, 7232, pp. 199-216.
Number of full-text downloads 48

2013

Bartlett, Harry, ALMashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 47

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 4

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Number of full-text downloads 50

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 134

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 48

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 99

Chuah, Chai Wen, Dawson, Edward, & Simpson, Leonie (2013) Key derivation function : the SCKDF scheme. IFIP Advances in Information and Communication Technology, 405, pp. 125-138.

2014

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC. (In Press)

Skandhakumar, Nimalaprakasan, Salim, Farzad, Drogemuller, Robin, Reid, Jason F., & Dawson, Edward (2014) Graph theory based representation of building information models for access control applications. Automation in Construction. (In Press)

Skandhakumar, Nimalaprakasan, Reid, Jason F., Salim, Farzad, & Dawson, Edward (2014) A policy model for access control using building information models. International Journal of Critical Infrastructure Protection.

Yarlagadda, Prasad K., Rosemann, Michael, Mengersen, Kerrie, Popovic, Vesna, Sridharan, Sridha, Fookes, Clinton B., et al. (2014) Airports of the future : improving operation, security and experience. Queensland University of Technology, Brisbane, QLD.

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 17

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 35

This list was generated on Sat Nov 1 06:15:35 2014 EST.