Browse By Person: Smith, Jason

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 26.

Book Chapter

Boyd, Colin, Gonzalez Nieto, Juan, Kuppusamy, Lakshmi, Narasimhan, Harikrishna, Rangan, Pandu, Rangasamy, Jothi, et al. (2011) Cryptographic approaches to denial-of-service resistance. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 183-238.
Number of citations in Web of Science® 3

Suriadi, Suriadi, Clark, Andrew, Liu, Hua, Schmidt, Desmond, Smith, Jason, & Stebila, Douglas (2011) Denial of service defence appliance for web services. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 239-298.
Number of citations in Web of Science® 1

Smith, Jason, Ahmed, Ejaz, Chellappan, C., Meenakshi, S., Raghavan, S., Suriadi, Suriadi, et al. (2011) DoS vulnerabilities in IPv6. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 299-321.

Journal Article

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 349
Number of citations in Scopus 7

Conference Paper

Liu, Vicky, Caelli, William, Smith, Jason, May, Lauren J., Lee, Min Hui, Ng, Zi Hao, et al. (2010) A secure architecture for Australia’s index based e-health environment. In Maeder , Anthony & Hansen, David (Eds.) Proceedings of The Australasian Workshop on Health Informatics and Knowledge Management (part of Australasian Computer Science Week ACSW 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 387

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 2

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 162
Number of citations in Scopus 5
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Number of full-text downloads 369

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 304
Number of citations in Scopus 12

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 22

Smith, Jason, Gill, Rupinder S., & Clark, Andrew J. (2006) On Securing Wireless LAN Access to Government Information Systems. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) 2006 RNSA Security Technology Conference – Recent advances in security technology, September 21, 2006, Canberra, Australia.
Number of full-text downloads 995

Gill, Rupinder S., Smith, Jason, & Clark, Andrew J. (2006) Specification-based intrusion detection in WLANs. In Annual Computer Security Applications Conference, Miami Beach, FL.
Number of full-text downloads 821
Number of citations in Scopus 15
Number of citations in Web of Science® 4

Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Number of full-text downloads 865
Number of citations in Scopus 24

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 596

Looi, Mark, Russell, Selwyn, & Smith, Jason (2004) Security as a Safety Issue in Rail Communications. In Lindsay, Peter & Cant, Tony (Eds.) Safety Critical Systems and Software 2003. Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (SCS03), October 2003, Canberra, Australia.

Russell, Selwyn & Smith, Jason (2004) Security Review of Telecommunications Data Services for Rail Communications. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference 2004, 12-15 December 2004, Gold Coast, Queensland.

Wullems, Christian, Tham, Kevin, Smith, Jason, & Looi, Mark (2004) A Trivial Denial of Service Attack on IEEE 802.11 Direct Sequence Spread Spectrum Wireless LANs. In Powell, S (Ed.) Wireless Telecommunications Symposium, 2004, IEEE, Pomona, California, USA, pp. 129-136.
Number of full-text downloads 274
Number of citations in Scopus 18

Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Number of full-text downloads 551
Number of citations in Scopus 26
Number of citations in Web of Science® 6

Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.

Report

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 282
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 77

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 148

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 186
Number of citations in Web of Science® 1

QUT Thesis

Smith, Jason (2007) Denial of service : prevention, modelling and detection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,587

This list was generated on Sun Jul 16 08:47:12 2017 AEST.