Browse By Person: Nieto, Juan
|Up a level|
Group by: Item Type | Date
Number of items: 9.
Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Albeshri, Aiiad, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Enhanced geoproof : improved geographic assurance for data in the cloud. International Journal of Information Security. (In Press)
Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Automated proofs of computational indistinguishability. The Computer Journal.
Ha, JeaCheol, Moon, SangJae, Nieto, Juan Manuel Gonzalez, & Boyd, Colin (2007) Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP). Emerging Technologies in Knowledge Discovery and Data Mining (LNCS), 4819, pp. 574-583.
Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.
Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.