Browse by Supervisor: Boyd, Colin

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 27.

PhD

Alawatugoda, Janaka Araliya Bandara (2015) On the leakage resilience of secure channel establishment. PhD thesis, Queensland University of Technology.
Number of full-text downloads 62

Seifi, Younes (2014) Formal analysis of security properties in trusted computing protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 193

Nyeem, Hussain Md Abu (2014) A digital watermarking framework with application to medical image security. PhD thesis, Queensland University of Technology.
Number of full-text downloads 194

Al Beshri, Aiiad Ahmad M. (2013) Outsourcing data storage without outsourcing trust in cloud computing. PhD thesis, Queensland University of Technology.
Number of full-text downloads 854

Leemaqz, Kaleb Lee (2013) Privacy of RFID - models and protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 296

Radke, Kenneth J. (2013) Security ceremonies : including humans in cryptographic protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 246

Ngo, Long (2012) Computationally sound automated proofs of cryptographic schemes. PhD thesis, Queensland University of Technology.
Number of full-text downloads 253

Rangasamy, Jothi Ramalingam (2012) Cryptographic techniques for managing computational effort. PhD thesis, Queensland University of Technology.
Number of full-text downloads 214

Costello, Craig (2012) Fast formulas for computing cryptographic pairings. PhD thesis, Queensland University of Technology.
Number of full-text downloads 548

Kuppusamy, Lakshmi Devi (2012) Modelling client puzzles and denial-of-service resistant protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 167
Number of citations in Web of ScienceĀ® 7

Sun, Dongdong (2012) Predicate encryption with various properties. PhD thesis, Queensland University of Technology.
Number of full-text downloads 229

Alsolami, Eesa (2012) An examination of keystroke dynamics for continuous user authentication. PhD thesis, Queensland University of Technology.
Number of full-text downloads 568

Lippold, Georg (2010) Encryption schemes and key exchange protocols in the certificateless setting. PhD thesis, Queensland University of Technology.
Number of full-text downloads 698

Tritilanunt, Suratose (2009) Protocol engineering for protection against denial-of-service attacks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 797

Du, Rong (2007) Secure electronic tendering. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,524

Brown, Jaimee (2007) Secure public-key encryption from factorisation-related problems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 516

Choo, Kim-Kwang Raymond (2006) Key establishment : proofs and refutations. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,074

Vasanta, Harikrishna (2006) Secure, privacy assured mechanisms for heterogeneous contextual environments. PhD thesis, Queensland University of Technology.
Number of full-text downloads 512

Aditya, Riza (2005) Secure electronic voting with flexible ballot structure. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,397

Tin, Yiu Shing (Terry) (2005) Secure key establishment for mobile networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 516

Peng, Kun (2004) Analysis and Design of Secure Sealed-Bid Auction. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,171

Ismail, Roslan (2004) Security of reputation systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 889

Maitland, Gregory (2003) Design of practical electronic cash schemes. PhD thesis, Queensland University of Technology.

Gonzalez-Nieto, Juan Manuel (2002) Key recovery systems. PhD thesis, Queensland University of Technology.

Viswanathan, Kapaleeswaran (2001) Compliant cryptologic protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 11

Pavlovski, Christopher John (2000) Applied batch cryptography. PhD thesis, Queensland University of Technology.
Number of full-text downloads 17

Masters by Research

Dawson, Robert Edward (2008) Secure communications for critical infrastructure control systems. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 2,395

This list was generated on Sun Sep 25 06:11:30 2016 AEST.