Browse By Person: Stebila, Douglas

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 48.

Book

Foo, Ernest & Stebila, Douglas (Eds.) (2015) Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Lecture Notes in Computer Science, 9144. Springer.

Book Chapter

Boyd, Colin, Gonzalez Nieto, Juan, Kuppusamy, Lakshmi, Narasimhan, Harikrishna, Rangan, Pandu, Rangasamy, Jothi, et al. (2011) Cryptographic approaches to denial-of-service resistance. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 183-238.
Number of citations in Web of Science® 3

Suriadi, Suriadi, Clark, Andrew, Liu, Hua, Schmidt, Desmond, Smith, Jason, & Stebila, Douglas (2011) Denial of service defence appliance for web services. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 239-298.

Journal Article

Poettering, Bertram & Stebila, Douglas (2015) Double-authentication-preventing signatures. International Journal of Information Security. (In Press)

Manulis, Mark, Poettering, Bertram, & Stebila, Douglas (2013) Plaintext awareness in identity-based key encapsulation. International Journal of Information Security.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 104

Broadbent, Anne, Gutoski, Gus, & Stebila, Douglas (2013) Quantum one-time programs. Lecture Notes in Computer Science [Advances in Cryptology - CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II], 8043, pp. 344-360.
Number of full-text downloads 27
Number of citations in Scopus 9

South, Leah & Stebila, Douglas (2013) Count-min sketches for estimating password frequency within Hamming distance two. Lecture Notes in Computer Science [Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 Proceedings], 7959, pp. 388-402.
Number of full-text downloads 23

Boyd, Colin, Cremers, Cas, Feltz, Michele, Paterson, Kenneth G., Bertram, Poettering, & Stebila, Douglas (2013) ASICS : authenticated key exchange security incorporating certification systems. Lecture Notes in Computer Science [Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings], 8134, pp. 381-399.
Number of full-text downloads 82
Number of citations in Scopus 2

Mosca, Michele, Stebila, Douglas, & Ustaoglu, Berkant (2013) Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932, pp. 136-154.
Number of full-text downloads 40
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Hassanzadeh, Reza, Nayak, Richi, & Stebila, Douglas (2012) Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. Lecture Notes in Computer Science : Web Information Systems Engineering, 7651, pp. 624-630.
Number of full-text downloads 460
Number of citations in Scopus 5

Goldberg, Ian, Ustaoglu, Berkant, & Stebila, Douglas (2012) Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), pp. 245-269.
Number of full-text downloads 192
Number of citations in Scopus 13
Number of citations in Web of Science® 5

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.
Number of citations in Scopus 1

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.
Number of citations in Scopus 1

Stebila, Douglas & Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. Information Security and Privacy (LNCS), 5594, pp. 389-406.
Number of full-text downloads 231
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Stebila, Douglas & Theriault, Nicolas (2006) Unified point addition formula and side-channel attacks. Lecture Notes in Computer Science, 4249, pp. 354-368.
Number of citations in Scopus 7

Conference Paper

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. In Groth, Jens (Ed.) Lecture Notes in Computer Science, Springer International Publishing, University of Oxford, Oxford, UK, pp. 277-294.

Dowling, Benjamin, Fischlin, Marc, Günther, Felix, & Stebila, Douglas (2015) A cryptographic analysis of the TLS 1.3 handshake protocol candidates. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, The Denver Marriot City Center, Denver, Colorado, pp. 1197-1210.
Number of full-text downloads 56
Number of citations in Scopus 4

Stebila, Douglas & Sullivan, Nick (2015) An analysis of TLS handshake proxying. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), IEEE, Helsinki, Finland, pp. 279-286.
Number of full-text downloads 55

Dowling, Benjamin & Stebila, Douglas (2015) Modelling ciphersuite and version negotiation in the TLS protocol. In Foo, Ernest & Stebila, Douglas (Eds.) Information Security and Privacy [Lecture Notes in Computer Science], Springer, QUT Gardens Point, Brisbane, Australia, pp. 270-288.
Number of full-text downloads 13

Bos, Joppe W., Costello, Craig, Naehrig, Michael, & Stebila, Douglas (2015) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In IEEE Symposium on Security and Privacy (S&P) 2015, 17-21 May 2015, San Jose, California, USA.
Number of full-text downloads 99
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Gutoski, Gus & Stebila, Douglas (2015) Hierarchical deterministic Bitcoin wallets that tolerate key leakage (short paper). In Böhme, Rainer & Okamoto, Tatsuaki (Eds.) Financial Cryptography and Data Security: 19th International Conference, FC 2015, Revised Selected Papers [Lecture Notes in Computer Science, Volume 8975], Springer, San Juan, Puerto Rico, United States of America, pp. 497-504.

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Protecting encrypted cookies from compression side-channel attacks. In Financial Cryptography and Data Security: 19th International Conference, FC 2015, Revised Selected Papers [Lecture Notes in Computer Science, Volume 8975], Sprinegr, San Juan, Puerto Rico, The United States of America, pp. 86-106.
Number of full-text downloads 78

Manulis, Mark, Stebila, Douglas, & Denham, Mark (2014) Secure modular password authentication for the web using channel bindings. In Chen, Liqun (Ed.) Proceedings of the 1st International Conference on Research in Security Standardisation (SSR) 2014, Springer, University of London, Egham, UK. (In Press)
Number of full-text downloads 164
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Bergsma, Florian, Dowling, Benjamin, Kohlar, Florian, Schwenk, Jörg, & Stebila, Douglas (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, pp. 369-381.
Number of full-text downloads 92
Number of citations in Scopus 3

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], Springer, Wroclaw, Poland, pp. 436-453.
Number of full-text downloads 93

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Number of full-text downloads 65
Number of citations in Web of Science® 4

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 27

Alawatugoda, Janaka, Boyd, Colin, & Stebila, Douglas (2014) Continuous after-the-fact leakage-resilient key exchange. In Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], Springer, Wollongong, Australia, pp. 258-273.
Number of full-text downloads 59
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Giesen, Florian, Kohlar, Florian, & Stebila, Douglas (2013) On the security of TLS renegotiation. In Gligor, V. & Yung, M. (Eds.) Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM, Berlin Congress Centre, Berlin.
Number of full-text downloads 157
Number of citations in Scopus 14

Arianezhad, Majid, Camp, L. Jean, Kelley, Timothy, & Stebila, Douglas (2013) Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY) 2013, ACM Digital Library, San Antonio, Texas, pp. 105-116.
Number of full-text downloads 459
Number of citations in Scopus 2

Arianezhad, Majid, Stebila, Douglas, & Mozaffari, Behzad (2013) Usability and security of gaze-based graphical grid passwords. In Adams, Andrew & Murata, Kiyoshi (Eds.) Lecture Notes in Computer Science [Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers], Springer, Okinawa, Japan, pp. 17-33.
Number of full-text downloads 249
Number of citations in Scopus 1

Gonzalez Nieto, Juan M., Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2012) Publicly verifiable ciphertexts. In Visconti, Ivan (Ed.) Proceedings of the 8th Conference on Security and Cryptography for Networks, Springer, Italy, pp. 393-410. (In Press)
Number of full-text downloads 182
Number of citations in Scopus 4

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.
Number of citations in Scopus 2

Kelley, Timothy, Camp, L. Jean, Lien, Suzanne, & Stebila, Douglas (2012) Self-identified experts lost on the interwebs. In Bishop, Matt & Shannon, Greg (Eds.) Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), ACM, Arlington, Virginia, pp. 47-54.
Number of full-text downloads 129

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 179
Number of citations in Scopus 2

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 269
Number of citations in Scopus 12

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 344
Number of citations in Scopus 8
Number of citations in Web of Science® 7

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 307
Number of citations in Scopus 5

Costello, Craig & Stebila, Douglas (2010) Fixed argument pairings. In Abdalla, Michel & Barreto, Paulo S.L.M. (Eds.) Progress in Cryptology -- LATINCRYPT 2010, Springer, Puebla, Mexico, pp. 92-108.
Number of full-text downloads 84
Number of citations in Scopus 2
Number of citations in Web of Science® 5

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 243
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 579
Number of citations in Scopus 2
Number of citations in Web of Science® 4

Stebila, Douglas, Udupi, Poornaprajna, & Chang, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 242

Mosca, Michele & Stebila, Douglas (2010) Quantum coins. In Bruen, Aiden A. & Wehlau, David L. (Eds.) Contemporary Mathematics, American Mathematical Society, Toronto, Ontario, pp. 35-47.
Number of full-text downloads 165
Number of citations in Web of Science® 10

Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Number of full-text downloads 469

Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbert (2009) The case for quantum key distribution. In Sergienko , A, Villoresi , P, & Pascazio , S (Eds.) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer, Vico Equense, Italy, pp. 283-296.
Number of full-text downloads 208
Number of citations in Scopus 5

Report

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 210

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 114

This list was generated on Sat Dec 3 18:45:07 2016 AEST.