QUT ePrints

Browse By Person: Dawson, Edward

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 141.

Book

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Number of full-text downloads 1,126

Book Chapter

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Dawson, Edward P. & Simpson, Leonie R. (2002) Analysis and Design Issues for Synchronous Stream Ciphers. In Niederreiter, Harald (Ed.) Coding Theory and Cryptology. Singapore University Press World Scientific, Singapore, pp. 49-90.

Dawson, Edward, Golic, Jovan, & Simpson, Leonie (2001) A Survey of Divide and Conquer Atacks on Certain Irregularly Clocked Stream Ciphers. In Cryptography And Computational Number Theory. Birkhauser Verlag, Basel, Switzerland, pp. 165-186.

Journal Article

Bartlett, Harry, ALMashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 46

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Number of full-text downloads 45

Chuah, Chai Wen, Dawson, Edward, & Simpson, Leonie (2013) Key derivation function : the SCKDF scheme. IFIP Advances in Information and Communication Technology, 405, pp. 125-138.

Skandhakumar, Nimalaprakasan, Salim, Farzad, Reid, Jason F., & Dawson, Edward (2012) Physical access control administration using building information models. Lecture Notes in Computer Science : Cyberspace Safety and Security, 7672, pp. 236-250.
Number of full-text downloads 18

Skandhakumar, Nimalaprakasan, Reid, Jason F., Dawson, Ed, Drogemuller, Robin, & Salim, Farzad (2012) An authorization framework using building information models. The Computer Journal, 55(10), 1244 -1264.
Number of full-text downloads 49
Number of citations in Scopus 2

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Number of full-text downloads 64

Chuah, Chai Wen, Dawson, Edward, Gonzalez Nieto, Juan Manuel, & Simpson, Leonie (2012) A framework for security analysis of key derivation functions. Lecture Notes in Computer Science, 7232, pp. 199-216.
Number of full-text downloads 41

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2011) An exploration of affine group laws for elliptic curves. Journal of Mathematical Cryptology, 5(1), pp. 1-50.

Peng, Kun, Dawson, Ed, & Bao, Feng (2011) Modification and optimisation of a shuffling scheme : stronger security, formal analysis and higher efficiency. International Journal of Information Security, 10(1), pp. 33-47.
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Number of full-text downloads 264

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research, 2(1), pp. 27-37.
Number of full-text downloads 112

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35(1), pp. 49-53.
Number of citations in Scopus 26
Number of citations in Web of Science® 10

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Jacobi quartic curves revisited. Lecture Notes in Computer Science, LNCS 5594, pp. 452-468.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Number of full-text downloads 85
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software, 82(2), pp. 270-273.
Number of citations in Scopus 37
Number of citations in Web of Science® 21

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers and Electrical Engineering, 35(1), p. 9.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'Aba, Muhammad (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 14
Number of citations in Web of Science® 14

Bao, Feng, Dawson, Ed, & Peng, Kun (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 24
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2008) Twisted Edwards curves revisited. Lecture Notes in Computer Science, LNCS 5350, pp. 326-343.
Number of citations in Scopus 28
Number of citations in Web of Science® 16

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Hisil, Huseyin, Carter, Gary P., & Dawson, Edward P. (2007) New Formulae for Efficient Elliptic Curve Arithmetic. Progress in Cryptology – INDOCRYPT 2007 (LNCS), 4859, pp. 138-151.
Number of full-text downloads 566
Number of citations in Scopus 18
Number of citations in Web of Science® 11

Betts, Martin, Black, Peter, Christensen, Sharon A., Dawson, Edward, Du, Rong, Duncan, William, et al. (2006) Towards secure and legal e-tendering. Journal of Information Technology in Construction, 11, pp. 89-102.
Number of full-text downloads 1,117
Number of citations in Scopus 6

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 63
Number of citations in Scopus 12
Number of citations in Web of Science® 10

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 2

Chen, Kevin, Henricksen, Matthew P., Millan, William L., Fuller, Joanne, Simpson, Leonie, Dawson, Edward, et al. (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2004), 3506, pp. 33-50.
Number of full-text downloads 126
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 132
Number of citations in Scopus 3

Fuller, Joanne, Millan, William, & Dawson, Edward (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing: computing paradigms and computational intelligence, 23(3), pp. 201-218.
Number of citations in Scopus 2

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 108
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Peng, Kun, Boyd, Colin A., & Dawson, Edward P. (2005) Simple and Efficient Shuffling with provable Correctness and ZK Privacy. Lecture Notes in Computer Science, pp. 188-204.
Number of full-text downloads 71
Number of citations in Web of Science® 20

Dawson, Edward, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Vivas, Jose (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Hitchcock, Yvonne R., Montague, Paul, Carter, Gary P., & Dawson, Edward P. (2004) The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. International Journal of Information Security, 3(2), pp. 86-98.

Dawson, Edward & Wu, Chuan (2004) Correlation Immunity and Resiliency of Symmetric Boolean Functions. Theorectical Computer Science Journal, 312(2), pp. 321-335.
Number of citations in Scopus 10
Number of citations in Web of Science® 5

Burnett, Linda, Clark, Andrew, Dawson, Edward, & Millan, William (2004) Simpler Methods for Generating Better Boolean Functions with Good Cryptographic Properties. The Australasian Journal of Combinatorics, 29, pp. 231-247.
Number of citations in Scopus 3

Clark, Andrew, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) Implementing an Efficient Elliptic Curve Cryptosystem over $GF(p)$ on a Smart Card. The ANZIAM Journal, 44(April 2003), pp. 354-377.

Dawson, Edward, Lopez, Javier, Okamoto, Eiji, & Russell, Selwyn (2003) Virtual Certificates And Synthetic Certificates: New Paradigms For Improving Public Key Validation. Computer Communications, 26(16), pp. 1826-1838.
Number of citations in Scopus 8
Number of citations in Web of Science® 5

Dawson, Edward P., Viswanathan, Kapaleeswaran, & Boyd, Colin A. (2002) Compliant cryptologic protocols. International Journal of Information Security, 1(3), pp. 189-202.

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2002) Hybrid Key Escrow: A New Paradigm. Computers & Security, 21(1), pp. 77-100.

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Dawson, Edward, Golic, Jovan, & Salmasizadeh, Mahmoud (2002) Statistical Weakness in Multiplexed Sequences. Finite Fields and Their Applications, 8(4), pp. 420-433.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Golic, Jovan Dj, Clark, Andrew J., & Dawson, Edward P. (2000) Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers, 49(10), pp. 1100-1109.
Number of full-text downloads 173
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 182
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Conference Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 12

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 23

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 82

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 46

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 46

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 72

Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Number of full-text downloads 61

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Number of full-text downloads 120
Number of citations in Scopus 5

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 90
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 62

Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Number of full-text downloads 83

Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Number of full-text downloads 326
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Number of full-text downloads 118

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 131

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 165

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 320

Teo, Sui-Guan, Al-Mashrafi, Mufeed, Simpson, Leonie R., & Dawson, Edward (2009) Analysis of authenticated encryption stream ciphers. In Proceedings (Abstracts and Papers) of the 20th National Conference of Australian Society for Operations Research, Australian Society for Operations Research Inc, Gold Coast.
Number of full-text downloads 381

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Faster group operations on elliptic curves. In Information Security 2009 : proceedings of the 7th Australasian Information Security Conference, CRPIT/Springer, Wellington, New Zealand, pp. 11-19.
Number of full-text downloads 65
Number of citations in Scopus 4

Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Number of full-text downloads 57
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Number of full-text downloads 45

Burdon, Mark, Gonzalez Nieto, Juan M., Christensen, Sharon A., Dawson, Edward P., Duncan, William D., & Lane, Bill B. (2007) Access Control in Federated Databases: How Legal Issues Shape Security. In Wimmer, Maria A., Scholl, Jochen, & Gronlund, Ake (Eds.) Electronic Government, 6th International Conference, EGOV 2007, 3-7 September, Regensburg, Germany.
Number of full-text downloads 53

Pham, Quan, McCullagh, Adrian J., & Dawson, Edward P. (2007) Consistency of user attribute in federated systems. In Lambrinoudakis, Costas, Pernul, Gunther, & Min Tjoa, A. (Eds.) Lecture Notes in Computer Science, Springer, Regensburg, Germany, pp. 165-177.
Number of full-text downloads 111
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Peng, Kun & Dawson, Edward P. (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. In Dawson, Edward P. & Wong, Duncan S. (Eds.) Third International Conference, ISPEC 2007: Information Security Practice and Experience, May 7-9, 2007, Hong Kong, China.
Number of full-text downloads 71
Number of citations in Scopus 9
Number of citations in Web of Science® 8

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 208
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Peng, Kun & Dawson, Edward P. (2007) A range test secure in the active adversary model. In Brankovic, L. & Steketee, C. (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Victoria.
Number of full-text downloads 50

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Dawson, Edward & Henricksen, Matthew (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 59

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 116
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 18
Number of citations in Scopus 2
Number of citations in Web of Science® 13

Dawson, Edward & Henricksen, Matthew (2006) Rekeying Issues in the MUGI Stream Cipher. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of full-text downloads 86
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 206
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 33

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 140
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Agudo, Isaac, Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005, July 2005, Greece, Samos Island.

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 35
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 67
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. In Jakobsson, M, Yung, M, & Zhou, J (Eds.) Applied Cryptography and Network Security Second International Conference on Applied Cryptography and Network Security (LNCS 3089), 8 - 11 June 2004, Yellow Mountain, China.
Number of full-text downloads 121
Number of citations in Scopus 6
Number of citations in Web of Science® 11

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) A Correct, Private and Efficient Mix Network. In Boa, F, Deng, R, & Zhou, J (Eds.) Publick Key Cryptography - PKC 2004. Seventh International Workshop on Theory and Practice in Public Key Cryptography., 1-4 March 2004, Singapore.
Number of full-text downloads 63
Number of citations in Scopus 14
Number of citations in Web of Science® 19

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. In Chae, K & Yung, M (Eds.) Information Security Applications. Fourth International Workshop, WISA 2003., 25-27 August 2003, Jeju Island, Korea.
Number of full-text downloads 51
Number of citations in Scopus 1

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. In Trust and Privacy in Digital Business, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 17
Number of citations in Web of Science® 10

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) Implementation Issues in Secure E-Voting Schemes. In Kozan, E (Ed.) Proceedings of Abstracts and Papers (On CD-Rom) of the Fifth Asia-Pacific Industrial Engineering and Management Systems (APIEMS) Conference 2004 and the Seventh Asia-Pacific Division Meeting of the International Foundation of Production Research, 12-15 December 2004, Gold Coast, Australia.
Number of full-text downloads 186

Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Number of full-text downloads 249

Dawson, Edward, Foo, Ernest, Peng, Kun, & Yao, Ming (2004) An Improved Forward Integrity Protocol for Mobile Agents. In Chae, K & Yung, M (Eds.) Information Security Applications. 4th International Workshop, WISA 2003, August 2003, Jeju Island, Korea.
Number of citations in Scopus 7

Bani Hammad, Yousef, Carter, Gary, Dawson, Edward, & Hitchcock, Yvonne (2004) Improvements to the RAK Factoring Algorithm. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Maitland, Gregory, & Yao, Minna (2004) A Mobile Agent System Providing Offer Privacy. In Wang,, Pieprzyk,, & Varadharajan, (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Dawson, Edward, Fuller, Joanne, & Millan, William (2004) Multi-Objective Optimisation of Bijective S-Boxes. In Greenwood, G (Ed.) Proceedings of the 2004 Congress on Evolutionary Computation (CEC2004), 19-23 June 2004, Portland, United States.
Number of citations in Scopus 4

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Multiplicative Homomorphic E-Voting. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. 5th International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 423
Number of citations in Scopus 14
Number of citations in Web of Science® 11

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) A New Security Architecture for Protecting the Dynamic Component of Mobile Agents. In Mohammadian, (Ed.) International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2004), 12 - 14 July 2004, Gold Coast, Australia.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. In Katsikas, Sokratis, Lopez, Javier, & Pernul, Gunther (Eds.) Trust and Privacy in Digital Business. First International Conference, TrustBus 2004, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Providing Receipt-Freeness In Mixnet-Based Voting Protocols. In Proceedings of the 6th International Conference on Infomation Security and Cryptology - ICISC 2003, 27-28 November 2003, Seoul, Korea.
Number of citations in Scopus 21
Number of citations in Web of Science® 3

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Secure Key Issuing in ID-Based Cryptography. In Hogan,, Montague,, Purvis,, & Steketee, (Eds.) ACSW Frontiers 2004, Proceedings of the Australian Information Security Workshop (AISW2004), January 2004, Dunedin, New Zealand.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) A Secure and Efficient Mix-Network Using Extended Binary Mixing Gate. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, Australia.
Number of full-text downloads 24

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Peng, Kun, & Yao, Minna (2004) Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. In Bauknecht, Kurt, Bichler, Martin, & Proll, Birgit (Eds.) E-Commerce and Web Technologies - EC-Web 2004. Fifth International Conference Proceedings., 31 August - 3 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2003) BAAI: Biometric Authentication and Authorization Infrastructure. In ITRE2003, 11-13 August, 2003, Newark, NJ, USA.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) Evolutionary Generation of Bent Functions for Cryptography. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003 Proceedings Vol.3, 8-12 December, 2003, Canberra, Australian Capital Territory.
Number of citations in Scopus 2

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Five Sealed-Bid Auction Models. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 31

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) New Concepts on Evolutionary Search for Boolean Functions in Cryptology. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003, Proceedings Volume 3, 8-12 December, 2003, Canberra, Australian Capital Territory.

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Non-Interactive Auction Scheme with Strong Privacy. In Lee, P & Lim, C (Eds.) Information Security and Cryptology - ICISC 2002, 28-29 November 2002, Seoul, Korea.
Number of full-text downloads 53
Number of citations in Scopus 3

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 468
Number of citations in Web of Science® 2

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2003) Secure E-Voting for Preferential Elections. In Traunmuller, R (Ed.) Eectronic Government - EGOV 2003, September, 2003, Prague, Czech Republic.
Number of full-text downloads 102
Number of citations in Scopus 2
Number of citations in Web of Science® 3

Carter, Gary, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) The Security of Fixed versus Random Elliptic Curves in Cryptography. In Safavi-Naini, R & Seberry, J (Eds.) Information Security and Privacy - ACISP 2003 (LNCS 2727), 9-11 July 2003, Wollongong, New South Wales.

Dawson, Edward, Fuller, Joanne, & Millan, William (2002) Efficient Algorithms for Analysis of Cryptographic Boolean Functions. In Billington,, Donovan,, & Khodkar, (Eds.) 13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 7-10 July, 2002, Fraser Island, Queensland.

Clark, Andrew J., Fuller, Joanne E., Golic, Jovan Dj, Dawson, Edward P., Lee, Hoon-Jae, Millan, William L., et al. (2002) The LILI-II Keystream Generator. In 7th Australian Conference on Information Security and Privacy, 3-5 July 2002, Melbourne, Victoria.
Number of full-text downloads 349
Number of citations in Web of Science® 16

Coulter, Robert, Dawson, Edward, Henderson, Marie, & Okamoto, Eiji (2002) Modelling trust structures for public key infrastructures. In Batten, & Seberry, (Eds.) LNCS 2384 Information Security and Privacy - Proceedings of the 7th Austalasian Conference (ACISP'02), 3-5 July, 2002, Melbourne, Victoria.
Number of citations in Web of Science® 4

Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2002) A New Design of Privilege Management Infrastructure for Organisations Using Outsourced PKI. In Chan, A & Gligor, V (Eds.) Information Security (ISC 2002), 30 Sept - 2 Oct, 2002, Sao Paulo, Brazil.

Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2002) Robust, Privacy Protecting, and Publicly Verifiable Sealed-bid Auction. In Deng,, Qing,, Boo,, & Zhou, (Eds.) Information and Communications Security (ICICS'02), 9-12 December, 2002, Singapore.
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) A Self-Escrowed Integer Factorisation Based Public Key Infrastructure. In Gonzalez, & Martinez, (Eds.) VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 5-7 September, 2002, Asturias, Spain.

Carter, Gary, Dawson, Edward, Henricksen, Matthew, May, Lauren, & Millan, William (2002) Strengthening the Key Schedule of the AES. In Batten, & Seberry, (Eds.) Information Security and Privacy (ACISP 02), 3-5 July, 2002, Melbourne.
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapali (2001) An Analysis of Integrity Services in Protocol. In Progress in Cryptology - INDOCRYPT 2001, 16-20 December 2001.

Boyd, Colin, Dawson, Edward, Kim, Jung-Joon, & Park, Dong-Gook (2001) Cryptographic Salt: A Countermeasure Against Denial-Of-Service Attacks. In Information Security and Privacy - ACISP 2001 (LNCS 2119), 11-13 July 2001.

Burnett, Linda, Carter, Gary, Dawson, Edward, & Millan, William (2001) Efficient Methods for Generating MARS-Like S-Boxes. In New York, U (Ed.) Fast Software Encryption, 10-12 April 2000.

Simpson, Leonie R., Dawson, Edward P., Golic, Jovan D.J., & Millan, William L. (2001) LILI Keystream Generator. In Selected Areas of Cryptography, 7th Annual International Workshop, SAC 2000, 14-15 August 2000, Ontario, Canada.
Number of full-text downloads 156

Boyd, Colin, Dawson, Edward, & Park, Dong-Gook (2001) Micropayments for Wireless Communications. In Information Security and Cryptology - ICISC 2000, 8-9 December 2000.

Boyd, Colin, Dawson, Edward, & Gonzalez-Nieto, Juanma (2001) A Public Key Cryptosystem Based on the Subgroup Membership Problem. In Information and Communications Security, 13-16 November 2001.

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 257

Conference Item

Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.

Report

Yarlagadda, Prasad K., Rosemann, Michael, Mengersen, Kerrie, Popovic, Vesna, Sridharan, Sridha, Fookes, Clinton B., et al. (2014) Airports of the future : improving operation, security and experience. Queensland University of Technology, Brisbane, QLD.

Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 57

Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 163

Dawson, Ed, Christensen, Sharon, Duncan, William, Black, Peter J., Ernest Foo, Ernest, & Du, Rong (2005) Security and legal issues in E-tendering. CRC for Construction Innovation, Brisbane.
Number of full-text downloads 125

QUT Thesis

Dawson, Edward Pyle (1991) Design and cryptanalysis of symmetric ciphers. PhD thesis, Queensland University of Technology.

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 120

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 41

Other

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Number of full-text downloads 715

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

This list was generated on Sat Jul 26 06:03:22 2014 EST.