QUT ePrints

Browse By Person: Nieto, Juan

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2006 | 2007 | 2010 | 2011 | 2012 | 2013
Number of items: 9.

2006

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Number of full-text downloads 1,126

2007

Ha, JeaCheol, Moon, SangJae, Nieto, Juan Manuel Gonzalez, & Boyd, Colin (2007) Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP). Emerging Technologies in Knowledge Discovery and Data Mining (LNCS), 4819, pp. 574-583.
Number of full-text downloads 62
Number of citations in Scopus 7
Number of citations in Web of Science® 5

2010

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.
Number of full-text downloads 102
Number of citations in Scopus 2
Number of citations in Web of Science® 1

2011

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 97
Number of citations in Scopus 1

2012

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Number of full-text downloads 47

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Number of full-text downloads 62

2013

Albeshri, Aiiad, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Enhanced geoproof : improved geographic assurance for data in the cloud. International Journal of Information Security, 13(2), pp. 191-198.

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Automated proofs of computational indistinguishability. The Computer Journal.

This list was generated on Sat Jul 26 07:39:43 2014 EST.