Browse By Person: Stebila, Douglas

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 40.

Book Chapter

Boyd, Colin, Gonzalez Nieto, Juan, Kuppusamy, Lakshmi, Narasimhan, Harikrishna, Rangan, Pandu, Rangasamy, Jothi, et al. (2011) Cryptographic approaches to denial-of-service resistance. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 183-238.

Suriadi, Suriadi, Clark, Andrew, Liu, Hua, Schmidt, Desmond, Smith, Jason, & Stebila, Douglas (2011) Denial of service defence appliance for web services. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 239-298.

Journal Article

Manulis, Mark, Poettering, Bertram, & Stebila, Douglas (2013) Plaintext awareness in identity-based key encapsulation. International Journal of Information Security.

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 56

Broadbent, Anne, Gutoski, Gus, & Stebila, Douglas (2013) Quantum one-time programs. Lecture Notes in Computer Science [Advances in Cryptology - CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II], 8043, pp. 344-360.
Number of full-text downloads 8
Number of citations in Scopus 4

South, Leah & Stebila, Douglas (2013) Count-min sketches for estimating password frequency within Hamming distance two. Lecture Notes in Computer Science [Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 Proceedings], 7959, pp. 388-402.
Number of full-text downloads 6

Boyd, Colin, Cremers, Cas, Feltz, Michele, Paterson, Kenneth G., Bertram, Poettering, & Stebila, Douglas (2013) ASICS : authenticated key exchange security incorporating certification systems. Lecture Notes in Computer Science [Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings], 8134, pp. 381-399.
Number of full-text downloads 53
Number of citations in Scopus 1

Mosca, Michele, Stebila, Douglas, & Ustaoglu, Berkant (2013) Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932, pp. 136-154.
Number of full-text downloads 30

Hassanzadeh, Reza, Nayak, Richi, & Stebila, Douglas (2012) Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. Lecture Notes in Computer Science : Web Information Systems Engineering, 7651, pp. 624-630.
Number of full-text downloads 371
Number of citations in Scopus 1

Goldberg, Ian, Ustaoglu, Berkant, & Stebila, Douglas (2012) Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), pp. 245-269.
Number of full-text downloads 142
Number of citations in Scopus 9
Number of citations in Web of Science® 1

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.
Number of citations in Scopus 1

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.
Number of citations in Scopus 1

Stebila, Douglas & Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. Information Security and Privacy (LNCS), 5594, pp. 389-406.
Number of full-text downloads 199
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Stebila, Douglas & Theriault, Nicolas (2006) Unified point addition formula and side-channel attacks. Lecture Notes in Computer Science, 4249, pp. 354-368.

Conference Paper

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Protecting encrypted cookies from compression side-channel attacks. In Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015), San Juan, Puerto Rico, The United States of America.
Number of full-text downloads 9

Manulis, Mark, Stebila, Douglas, & Denham, Mark (2014) Secure modular password authentication for the web using channel bindings. In Chen, Liqun (Ed.) Proceedings of the 1st International Conference on Research in Security Standardisation (SSR) 2014, Springer, University of London, Egham, UK. (In Press)
Number of full-text downloads 7

Bergsma, Florian, Dowling, Benjamin, Kohlar, Florian, Schwenk, Jörg, & Stebila, Douglas (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, pp. 369-381.
Number of full-text downloads 18

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], Springer, Wroclaw, Poland, pp. 436-453.
Number of full-text downloads 30

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Number of full-text downloads 15

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 14

Alawatugoda, Janaka, Boyd, Colin, & Stebila, Douglas (2014) Continuous after-the-fact leakage-resilient key exchange. In Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], Springer, Wollongong, Australia, pp. 258-273.
Number of full-text downloads 40

Giesen, Florian, Kohlar, Florian, & Stebila, Douglas (2013) On the security of TLS renegotiation. In Gligor, V. & Yung, M. (Eds.) Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM, Berlin Congress Centre, Berlin.
Number of full-text downloads 105
Number of citations in Scopus 4

Arianezhad, Majid, Camp, L. Jean, Kelley, Timothy, & Stebila, Douglas (2013) Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY) 2013, ACM Digital Library, San Antonio, Texas, pp. 105-116.
Number of full-text downloads 360

Arianezhad, Majid, Stebila, Douglas, & Mozaffari, Behzad (2013) Usability and security of gaze-based graphical grid passwords. In Adams, Andrew & Murata, Kiyoshi (Eds.) Lecture Notes in Computer Science [Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers], Springer, Okinawa, Japan, pp. 17-33.
Number of full-text downloads 200

Gonzalez Nieto, Juan M., Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2012) Publicly verifiable ciphertexts. In Visconti, Ivan (Ed.) Proceedings of the 8th Conference on Security and Cryptography for Networks, Springer, Italy, pp. 393-410. (In Press)
Number of full-text downloads 151
Number of citations in Scopus 3

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.

Kelley, Timothy, Camp, L. Jean, Lien, Suzanne, & Stebila, Douglas (2012) Self-identified experts lost on the interwebs. In Bishop, Matt & Shannon, Greg (Eds.) Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), ACM, Arlington, Virginia, pp. 47-54.
Number of full-text downloads 97

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 115
Number of citations in Scopus 2

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 217
Number of citations in Scopus 8

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 253
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 231
Number of citations in Scopus 5

Costello, Craig & Stebila, Douglas (2010) Fixed argument pairings. In Abdalla, Michel & Barreto, Paulo S.L.M. (Eds.) Progress in Cryptology -- LATINCRYPT 2010, Springer, Puebla, Mexico, pp. 92-108.
Number of full-text downloads 54
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 191
Number of citations in Scopus 9
Number of citations in Web of Science® 5

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 463
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Stebila, Douglas, Udupi, Poornaprajna, & Chang, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 189

Mosca, Michele & Stebila, Douglas (2010) Quantum coins. In Bruen, Aiden A. & Wehlau, David L. (Eds.) Contemporary Mathematics, American Mathematical Society, Toronto, Ontario, pp. 35-47.
Number of full-text downloads 146
Number of citations in Web of Science® 5

Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Number of full-text downloads 330

Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbert (2009) The case for quantum key distribution. In Sergienko , A, Villoresi , P, & Pascazio , S (Eds.) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer, Vico Equense, Italy, pp. 283-296.
Number of full-text downloads 135
Number of citations in Scopus 4

Report

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 178

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 95

This list was generated on Sat Feb 28 05:47:35 2015 AEST.