Browse By Person: Bartlett, Harry

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 43.

Book Chapter

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2015) Flaws in the initialisation process of stream ciphers. In Daras, Nicholas & Rassias, Michael (Eds.) Computation, Cryptography, and Network Security. Springer International Publishing, Cham, Switzerland, pp. 19-49.
Number of citations in Scopus 1

Journal Article

Bartlett, Harry, Dawson, Ed, Quhar al Mahri, Hassan, Salam, Md Iftekhar, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2019) Random fault attacks on a class of stream ciphers. Security and Communication Networks, 2019, Article ID-1680263.
Number of full-text downloads 9

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward P., & Wong, Kenneth Koon-Ho (2018) Fault analysis of AEZ. Concurrency and Computation: Practice and Experience. (In Press)
Number of full-text downloads 3
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Salam, Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2018) Fault attacks on the authenticated encryption stream cipher MORUS. Cryptography, 2(1).
Number of full-text downloads 15

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2018) A fundamental flaw in the ++AE authenticated encryption mode. Journal of Mathematical Cryptology, 12(1), pp. 1-6.
Number of full-text downloads 14

Chu Van, Thuy, Ristovski, Zoran, Pourkhesalian, Ali Mohammad, Rainey, Thomas, Garaniya, Vikram, Abbassi, Rouzbeh, et al. (2017) On-board measurements of particle and gaseous emissions from a large cargo vessel at different operating conditions. Environmental Pollution, 237, pp. 832-841.
Number of citations in Scopus 15
Number of citations in Web of Science® 10

Bellet, R. Nicole, Lamb, Rhonda L., Gould, Tonya D., & Bartlett, Harry J. (2017) Prevalence of neuro-musculoskeletal pain and dysfunction in open-heart surgical patients preoperatively and at 6 and 12 weeks postoperatively: A prospective longitudinal observation study. Pragmatic and Observational Research, 8, pp. 211-222.
Number of full-text downloads 7

Beck, Leyla, Mohamed, Abdi-Aziz, Strugnell, Wendy E., Bartlett, Harry, Rodriguez, Viviana, Hamilton-Craig, Christian, et al. (2017) MRI measurements of the thoracic aorta and pulmonary artery. Journal of Medical Imaging and Radiation Oncology, 62(1), pp. 64-71.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry (2015) CHURNs : freshness assurance for humans. The Computer Journal, 58(10), pp. 2404-2425.
Number of full-text downloads 52
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 148
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 54

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry (2013) Security analysis of linearly filtered NLFSRs. Journal of Mathematical Cryptology, 7(4), pp. 313-332.
Number of full-text downloads 21
Number of citations in Scopus 1

Bellet, R. Nicole, Francis, Rebecca L, Jacob, Justin S, Healy, Karen M, Bartlett, Harold John Gregory, Adams, Lewis, et al. (2013) Timed Up and Go Tests in cardiac rehabilitation : reliability and comparison with the 6-minute walk test. Journal of Cardiopulmonary Rehabilitation & Prevention, 33(2), pp. 99-105.
Number of citations in Scopus 10
Number of citations in Web of Science® 10

Kelly, Mark D., Gibson, Abby, Bartlett, Harry, Rowling, Diane, & Patten, John (2013) Tenofovir-associated proteinuria. AIDS, 27(3), pp. 479-481.
Number of full-text downloads 44
Number of citations in Scopus 12
Number of citations in Web of Science® 9

Hansen, Kim, Thom, Ogilvie, Rodda, Hamish, Price, Melanie, Jackson, Chris, Bennetts, Scott, et al. (2012) Impact of pain location, organ system and treating speciality on timely delivery of analgesia in emergency departments. EMA - Emergency Medicine Australasia, 24(1), pp. 64-71.
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Lewis, Peter A., Bartlett, Harry, Townsend, Shane, Courtney, Mary D., Mullany, Daniel V., & Coyer, Fiona M. (2011) A prospective pilot study evaluating the ‘cardiac decompensation score’ in the setting of intraaortic balloon counterpulsation. Intensive and Critical Care Nursing, 27(1), pp. 31-36.
Number of full-text downloads 104
Number of citations in Scopus 1

Haerer, Wendy, Delbaere, Kim, Bartlett, Harry, Lord, Stephen, & Rowland, Jeffrey (2011) Relationships between HMG-CoA reductase inhibitors (statin) use and strength, balance and falls in older people. Internal Medicine Journal, Online(Online), pp. 1-17.
Number of citations in Scopus 21
Number of citations in Web of Science® 19

Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al. (2011) Repeated six-minute walk tests for outcome measurement and exercise prescription in outpatient cardiac rehabilitation: A longitudinal study. Archives of Physical Medicine and Rehabilitation, 92(9), pp. 1388-1394.
Number of citations in Scopus 17
Number of citations in Web of Science® 16

Strugnell, Wendy, Hamilton-Craig, Christian, Parry, Temeeka, Bartlett, Harry, & Slaughter, Richard (2010) Cardiac MRI is Superior to Gated Blood Pool Imaging in the Assessment of Left Function in Patients Post-cardiac Transplantation. Heart, Lung and Circulation, 19(7), pp. 400-405.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Fukushima, Satsuki, Tesar, Peter, Jalali, Homayoun, Clarke, Andrew, Sharma, Hemant, Choudhary, Jivesh, et al. (2010) Determinants of in-hospital and long-term surgical outcomes after repair of postinfarction ventricular septal rupture. The Journal of Thoracic and Cardiovascular Surgery, 140(1), pp. 59-65.
Number of citations in Scopus 22
Number of citations in Web of Science® 23

Bartlett, Harold, Riley, Robyn, Slaughter, Richard, Strugnell, Wendy, & Trotter, Andrew (2005) Modified RV Short Axis Series - A New Method for Cardiac MRI Measurement of Right Ventricular Volumes. Journal of Cardiovascular Magnetic Resonance, 7(5), pp. 769-774.
Number of citations in Scopus 42
Number of citations in Web of Science® 35

Conference Paper

Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2019) Differential random fault attacks on certain CAESAR stream ciphers. In 22nd Annual International Conference on Information Security and Cryptology (ICISC 2019), 4-6 December 2019, Seoul, Republic of Korea. (In Press)
Number of full-text downloads 3

Salam, Iftekhar, Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2018) Fault attacks on Tiaoxin-346. In 2018 Australasian Computer Science Week (ASCW), 30 January - 2 February 2018, Brisbane, Qld.
Number of citations in Scopus 2

Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, & Wong, Kenneth Koon-Ho (2017) Investigating cube attacks on the authenticated encryption stream cipher MORUS. In 2017 IEEE Trustcom/BigDataSE/ICESS, 1-4 August 2017, Sydney, N.S.W.
Number of full-text downloads 55
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Wong, Kenneth Koon-Ho (2017) A fault-based attack on AEZ v4.2. In IEEE Trustcom/BigDataSE/ICESS 2017, 1-4 August 2017, Sydney, N.S.W.
Number of full-text downloads 28
Number of citations in Scopus 1

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2017) Fault attacks on XEX mode with application to certain authenticated encryption modes. In Pieprzyk, Josef & Suriadi, Suriadi (Eds.) Information Security and Privacy, Springer International Publishing AG, Auckland, New Zealand, pp. 285-305.
Number of full-text downloads 20

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward P., & Wong, Kenneth Koon-Ho (2016) Tweaking generic OTR to avoid forgery attacks. In Batten, L. & Li, G. (Eds.) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, Springer, Cairns, Qld, pp. 41-53.
Number of full-text downloads 29
Number of citations in Scopus 1

Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2016) Investigating cube attacks on the authenticated encryption stream cipher ACORN. In International Conference on Applications and Techniques in Information Security (ATIS 2016), 26-28 October 2016, Cairns, Qld.
Number of full-text downloads 43
Number of citations in Scopus 14
Number of citations in Web of Science® 12

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Kenneth Koon-Ho, Wong (2016) Forgery attacks on ++AE authenticated encryption mode. In ACSW '16 Proceedings of the Australasian Computer Science Week Multiconference, ACM, Canberra, A.C.T.
Number of full-text downloads 66
Number of citations in Scopus 1

Salam, Md Iftekhar, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef (2016) Finding state collisions in the authenticated encryption stream cipher ACORN. In ACSW '16 Australasian Computer Science Week, 2 - 5 February 2016, Canberra, A.C.T.
Number of citations in Scopus 2

Di, Binbin, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2015) Correcting flaws in Mitchell’s analysis of EPBC. In Welch, Ian & Yi, Xun (Eds.) Proceedings of the 13th Australasian Information Security Conference, Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 57-60.
Number of full-text downloads 44

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC, pp. 220-233.
Number of citations in Scopus 1

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 57
Number of citations in Scopus 4

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 159

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 221
Number of citations in Scopus 2

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 241
Number of citations in Scopus 1

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 105
Number of citations in Scopus 4

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.
Number of citations in Scopus 2

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 139
Number of citations in Scopus 3

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 114

QUT Thesis

Bartlett, Harold John Gregory (1998) Reliability analysis with suspended items. PhD thesis, Queensland University of Technology.
Number of full-text downloads 401

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 218

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 73

This list was generated on Sun Dec 8 08:17:05 2019 AEST.