QUT ePrints

Browse By Person: Smith, Jason

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 24.

Journal Article

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 181
Number of citations in Scopus 5

Conference Paper

Liu, Vicky, Caelli, William, Smith, Jason, May, Lauren J., Lee, Min Hui, Ng, Zi Hao, et al. (2010) A secure architecture for Australia’s index based e-health environment. In Maeder , Anthony & Hansen, David (Eds.) Proceedings of The Australasian Workshop on Health Informatics and Knowledge Management (part of Australasian Computer Science Week ACSW 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 220

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 2

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 104
Number of citations in Scopus 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Web of Science® 1

Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Number of full-text downloads 263

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 227
Number of citations in Scopus 1

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 4

Smith, Jason, Gill, Rupinder S., & Clark, Andrew J. (2006) On Securing Wireless LAN Access to Government Information Systems. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) 2006 RNSA Security Technology Conference – Recent advances in security technology, September 21, 2006, Canberra, Australia.
Number of full-text downloads 869

Gill, Rupinder S., Smith, Jason, & Clark, Andrew J. (2006) Specification-based intrusion detection in WLANs. In Annual Computer Security Applications Conference, Miami Beach, FL.
Number of full-text downloads 600
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Number of full-text downloads 372

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 430

Russell, Selwyn & Smith, Jason (2004) Security Review of Telecommunications Data Services for Rail Communications. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference 2004, 12-15 December 2004, Gold Coast, Queensland.

Looi, Mark, Russell, Selwyn, & Smith, Jason (2004) Security as a Safety Issue in Rail Communications. In Lindsay, Peter & Cant, Tony (Eds.) Safety Critical Systems and Software 2003. Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (SCS03), October 2003, Canberra, Australia.

Wullems, Christian, Tham, Kevin, Smith, Jason, & Looi, Mark (2004) A Trivial Denial of Service Attack on IEEE 802.11 Direct Sequence Spread Spectrum Wireless LANs. In Powell, S (Ed.) Wireless Telecommunications Symposium, 2004, IEEE, Pomona, California, USA, pp. 129-136.
Number of full-text downloads 158
Number of citations in Scopus 8

Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Number of full-text downloads 405
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.

Report

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 214

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 62

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 87

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 129

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-centric Protocol for Conditional Anonymity Revocation. (In Press)
Number of full-text downloads 134

QUT Thesis

Smith, Jason (2007) Denial of service : prevention, modelling and detection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,085

This list was generated on Sat Apr 19 10:12:45 2014 EST.