Browse By Person: Stebila, Douglas

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 44.

Book

Foo, Ernest & Stebila, Douglas (Eds.) (2015) Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Lecture Notes in Computer Science, 9144. Springer.

Book Chapter

Boyd, Colin, Gonzalez Nieto, Juan, Kuppusamy, Lakshmi, Narasimhan, Harikrishna, Rangan, Pandu, Rangasamy, Jothi, et al. (2011) Cryptographic approaches to denial-of-service resistance. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 183-238.

Suriadi, Suriadi, Clark, Andrew, Liu, Hua, Schmidt, Desmond, Smith, Jason, & Stebila, Douglas (2011) Denial of service defence appliance for web services. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 239-298.

Journal Article

Manulis, Mark, Poettering, Bertram, & Stebila, Douglas (2013) Plaintext awareness in identity-based key encapsulation. International Journal of Information Security.

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 68

Broadbent, Anne, Gutoski, Gus, & Stebila, Douglas (2013) Quantum one-time programs. Lecture Notes in Computer Science [Advances in Cryptology - CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II], 8043, pp. 344-360.
Number of full-text downloads 19
Number of citations in Scopus 4

South, Leah & Stebila, Douglas (2013) Count-min sketches for estimating password frequency within Hamming distance two. Lecture Notes in Computer Science [Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 Proceedings], 7959, pp. 388-402.
Number of full-text downloads 15

Boyd, Colin, Cremers, Cas, Feltz, Michele, Paterson, Kenneth G., Bertram, Poettering, & Stebila, Douglas (2013) ASICS : authenticated key exchange security incorporating certification systems. Lecture Notes in Computer Science [Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings], 8134, pp. 381-399.
Number of full-text downloads 67
Number of citations in Scopus 1

Mosca, Michele, Stebila, Douglas, & Ustaoglu, Berkant (2013) Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932, pp. 136-154.
Number of full-text downloads 36

Hassanzadeh, Reza, Nayak, Richi, & Stebila, Douglas (2012) Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. Lecture Notes in Computer Science : Web Information Systems Engineering, 7651, pp. 624-630.
Number of full-text downloads 418
Number of citations in Scopus 1

Goldberg, Ian, Ustaoglu, Berkant, & Stebila, Douglas (2012) Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), pp. 245-269.
Number of full-text downloads 155
Number of citations in Scopus 11
Number of citations in Web of Science® 3

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.
Number of citations in Scopus 1

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.
Number of citations in Scopus 1

Stebila, Douglas & Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. Information Security and Privacy (LNCS), 5594, pp. 389-406.
Number of full-text downloads 216
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Stebila, Douglas & Theriault, Nicolas (2006) Unified point addition formula and side-channel attacks. Lecture Notes in Computer Science, 4249, pp. 354-368.

Conference Paper

Dowling, Benjamin & Stebila, Douglas (2015) Modelling ciphersuite and version negotiation in the TLS protocol. In Foo, Ernest & Stebila, Douglas (Eds.) Information Security and Privacy [Lecture Notes in Computer Science], Springer, QUT Gardens Point, Brisbane, Australia, pp. 270-288.

Bos, Joppe W., Costello, Craig, Naehrig, Michael, & Stebila, Douglas (2015) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In IEEE Symposium on Security and Privacy (S&P) 2015, 17-21 May 2015, San Jose, California, USA.
Number of full-text downloads 7

Gutoski, Gus & Stebila, Douglas (2015) Hierarchical deterministic Bitcoin wallets that tolerate key leakage (short paper). In Böhme, Rainer & Okamoto, Tatsuaki (Eds.) Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015), Springer, San Juan, Puerto Rico, United States of America. (In Press)

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Protecting encrypted cookies from compression side-channel attacks. In Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015), San Juan, Puerto Rico, The United States of America.
Number of full-text downloads 52

Manulis, Mark, Stebila, Douglas, & Denham, Mark (2014) Secure modular password authentication for the web using channel bindings. In Chen, Liqun (Ed.) Proceedings of the 1st International Conference on Research in Security Standardisation (SSR) 2014, Springer, University of London, Egham, UK. (In Press)
Number of full-text downloads 49

Bergsma, Florian, Dowling, Benjamin, Kohlar, Florian, Schwenk, Jörg, & Stebila, Douglas (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, pp. 369-381.
Number of full-text downloads 50

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], Springer, Wroclaw, Poland, pp. 436-453.
Number of full-text downloads 53

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Number of full-text downloads 43

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 20

Alawatugoda, Janaka, Boyd, Colin, & Stebila, Douglas (2014) Continuous after-the-fact leakage-resilient key exchange. In Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], Springer, Wollongong, Australia, pp. 258-273.
Number of full-text downloads 49
Number of citations in Scopus 1

Giesen, Florian, Kohlar, Florian, & Stebila, Douglas (2013) On the security of TLS renegotiation. In Gligor, V. & Yung, M. (Eds.) Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM, Berlin Congress Centre, Berlin.
Number of full-text downloads 130
Number of citations in Scopus 4

Arianezhad, Majid, Camp, L. Jean, Kelley, Timothy, & Stebila, Douglas (2013) Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY) 2013, ACM Digital Library, San Antonio, Texas, pp. 105-116.
Number of full-text downloads 397

Arianezhad, Majid, Stebila, Douglas, & Mozaffari, Behzad (2013) Usability and security of gaze-based graphical grid passwords. In Adams, Andrew & Murata, Kiyoshi (Eds.) Lecture Notes in Computer Science [Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers], Springer, Okinawa, Japan, pp. 17-33.
Number of full-text downloads 225

Gonzalez Nieto, Juan M., Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2012) Publicly verifiable ciphertexts. In Visconti, Ivan (Ed.) Proceedings of the 8th Conference on Security and Cryptography for Networks, Springer, Italy, pp. 393-410. (In Press)
Number of full-text downloads 165
Number of citations in Scopus 4

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.
Number of citations in Scopus 1

Kelley, Timothy, Camp, L. Jean, Lien, Suzanne, & Stebila, Douglas (2012) Self-identified experts lost on the interwebs. In Bishop, Matt & Shannon, Greg (Eds.) Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), ACM, Arlington, Virginia, pp. 47-54.
Number of full-text downloads 108

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 157
Number of citations in Scopus 2

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 245
Number of citations in Scopus 8

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 301
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 280
Number of citations in Scopus 5

Costello, Craig & Stebila, Douglas (2010) Fixed argument pairings. In Abdalla, Michel & Barreto, Paulo S.L.M. (Eds.) Progress in Cryptology -- LATINCRYPT 2010, Springer, Puebla, Mexico, pp. 92-108.
Number of full-text downloads 69
Number of citations in Scopus 2
Number of citations in Web of Science® 3

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 221
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 513
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Stebila, Douglas, Udupi, Poornaprajna, & Chang, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 226

Mosca, Michele & Stebila, Douglas (2010) Quantum coins. In Bruen, Aiden A. & Wehlau, David L. (Eds.) Contemporary Mathematics, American Mathematical Society, Toronto, Ontario, pp. 35-47.
Number of full-text downloads 156
Number of citations in Web of Science® 6

Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Number of full-text downloads 391

Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbert (2009) The case for quantum key distribution. In Sergienko , A, Villoresi , P, & Pascazio , S (Eds.) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer, Vico Equense, Italy, pp. 283-296.
Number of full-text downloads 161
Number of citations in Scopus 4

Report

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 189

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 99

This list was generated on Sat Aug 29 12:43:29 2015 AEST.