Browse By Person: Bartlett, Harry

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2005 | 1998
Number of items: 44.

2019

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2019) Fault analysis of AEZ. Concurrency and Computation: Practice and Experience, 31(23), Article number: e4785 1-11.
Number of full-text downloads 24
Number of citations in Scopus 1

Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2019) Differential random fault attacks on certain CAESAR stream ciphers. In International Conference on Information Security and Cryptology, 2019-01-01. (In Press)
Number of full-text downloads 13

Bartlett, Harry, Dawson, Ed, Qahur Al Mahri, Hassan Musallam Ahmed, Salam, Md. Iftekhar, Simpson, Leonie, & Wong, Kenneth (2019) Random fault attacks on a class of stream ciphers. Security and Communication Networks, 2019, Article number: 1680263 1-12.
Number of full-text downloads 40
Number of citations in Scopus 1

2018

Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2018) Fault attacks on the authenticated encryption stream cipher MORUS. Cryptography, 2(1), Article number: 4 1-19.
Number of full-text downloads 38

Salam, Md Iftekhar, Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2018) Fault attacks on Tiaoxin-346. In Abramson, D & Ngoc Dinh, M (Eds.) Proceedings of the Australasian Computer Science Week Multiconference (ACSW '18). Association for Computing Machinery, United States of America, pp. 1-9.
Number of citations in Scopus 2

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2018) A fundamental flaw in the ++AE authenticated encryption mode. Journal of Mathematical Cryptology, 12(1), pp. 37-42.
Number of full-text downloads 32

Beck, Leyla, Mohamed, Abdi-Aziz, Strugnell, Wendy, Bartlett, Harry, Rodriguez, Viviana, Hamilton-Craig, Christian, et al. (2018) MRI measurements of the thoracic aorta and pulmonary artery. Journal of Medical Imaging and Radiation Oncology, 62(1), pp. 64-71.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Chu Van, Thuy, Ristovski, Zoran, Pourkhesalian, Ali Mohammad, Rainey, Thomas, Garaniya, Vikram, Abbassi, Rouzbeh, et al. (2018) On-board measurements of particle and gaseous emissions from a large cargo vessel at different operating conditions. Environmental Pollution, 237, pp. 832-841.
Number of citations in Scopus 23
Number of citations in Web of Science® 15

2017

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2017) Fault attacks on XEX mode with application to certain authenticated encryption modes. In Suriadi, S & Pieprzyk, J (Eds.) Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Proceedings, Part I (Lecture Notes in Computer Science, Volume 10342). Springer, Switzerland, pp. 285-305.
Number of full-text downloads 52

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2017) A fault-based attack on AEZ v4.2. In Mu, Y, Nanda, P, & Xiang, Y (Eds.) Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, United States of America, pp. 634-641.
Number of full-text downloads 50
Number of citations in Scopus 1

Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, & Wong, Kenneth (2017) Investigating cube attacks on the authenticated encryption stream cipher MORUS. In Mu, Y, Nanda, P, & Xiang, Y (Eds.) Proceedings of the Joint IEEE TrustCom / BigDataSE / ICESS Conference 2017. IEEE, United States of America, pp. 961-966.
Number of full-text downloads 91
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Bellet, R. Nicole, Lamb, Rhonda, Gould, Tonya, & Bartlett, Harry (2017) Prevalence of neuro-musculoskeletal pain and dysfunction in open-heart surgical patients preoperatively and at 6 and 12 weeks postoperatively: a prospective longitudinal observation study. Journal of Pragmatic and Observational Research, 2017, Article number: 8 211-222.
Number of full-text downloads 45

2016

Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al. (2016) Fast-track equivalent to traditional cardiac rehabilitation? Pilot study outcome. European Journal of Physiotherapy, 18(2), pp. 126-136.
Number of full-text downloads 76
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Salam, Md Iftekhar, Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef (2016) Finding state collisions in the authenticated encryption stream cipher ACORN. In Yi, X & Russello, G (Eds.) Proceedings of the Australasian Computer Science Week Multiconference. Association for Computing Machinery, United States of America, pp. 1-10.

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2016) Forgery attacks on ++AE authenticated encryption mode. In Yi, X & Russello, G (Eds.) Proceedings of the Australasian Computer Science Week Multiconference. Association for Computing Machinery, United States of America, pp. 1-9.
Number of full-text downloads 97
Number of citations in Scopus 1

Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth (2016) Investigating cube attacks on the authenticated encryption stream cipher ACORN. In Li, G & Batten, L (Eds.) Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings [Communications in Computer and Information Science, Volume 651]. Springer Nature Singapore, Singapore, pp. 15-26.
Number of full-text downloads 77
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2016) Tweaking generic OTR to avoid forgery attacks. In Li, G & Batten, L (Eds.) Applications and Techniques in Information Security: 6th International Conference, ATIS 2016 Proceedings [Communications in Computer and Information Science, Volume 651]. Springer Nature Singapore Pte Ltd., Singapore, pp. 41-53.
Number of full-text downloads 58
Number of citations in Scopus 1

2015

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Bartlett, Harry (2015) CHURNs: Freshness assurance for humans. Computer Journal, 58(10), pp. 2404-2425.
Number of full-text downloads 80
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Di, Allen, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth (2015) Correcting flaws in Mitchell's analysis of EPBC. In Yi, X & Welch, I (Eds.) Proceedings of the 13th Australasian Information Security Conference (AISC 2015) [Conferences in Research and Practice in Information Technology (CRPIT), Volume161]. Australian Computer Society Inc., Australia, pp. 57-60.
Number of full-text downloads 44

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2015) Flaws in the initialisation process of stream ciphers. In Daras, N J & Rassias, M T (Eds.) Computation, cryptography, and network security. Springer, Switzerland, pp. 19-49.
Number of citations in Scopus 1

2014

Teo, Sui Guan, Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Welch, I & Parampalli, U (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149]. Australian Computer Society Inc., Australia, pp. 77-81.
Number of full-text downloads 59

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2014) Weak key-IV pairs in the A5/1 stream cipher. In Welch, I & Parampalli, U (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149]. Australian Computer Society Inc., Australia, pp. 23-36.
Number of full-text downloads 159

Bartlett, Harry, Al Hamdan, Ali, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Schmidt, K U & Winterhof, A (Eds.) Sequences and Their Applications - SETA 2014: th International Conference, Proceedings [Lecture Notes in Computer Science, Volume 8865]. Springer, Switzerland, pp. 220-233.
Number of citations in Scopus 1

2013

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 219

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 73

Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth (2013) A general model for MAC generation using direct injection. In Yung, M & Kutylowski, M (Eds.) Information Security and Cryptology: 8th International Conference, Inscrypt 2012 [Lecture Notes in Computer Science, Vol 7763]. Springer, Germany, pp. 198-215.
Number of full-text downloads 175
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 84

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry (2013) Security analysis of linearly filtered NLFSRs. Journal of Mathematical Cryptology, 7(4), pp. 313-332.
Number of full-text downloads 48

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, C & Parampalli, U (Eds.) Proceedings of the Eleventh Australasian Information Security Conference, AISC 2013 [Conferences in Research and Practice in Information Technology, Volume 138]. Australian Computer Society, Australia, pp. 3-12.
Number of full-text downloads 228
Number of citations in Scopus 2

Kelly, Mark, Gibson, Abby, Bartlett, Harry, Rowling, Dianne, & Patten, John (2013) Tenofovir-associated proteinuria [Letter]. AIDS, 27(3), pp. 479-481.
Number of full-text downloads 56
Number of citations in Scopus 12
Number of citations in Web of Science® 9

Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al. (2013) Timed Up and Go Tests in cardiac rehabilitation: reliability and comparison with the 6-Minute Walk Test. Journal of Cardiopulmonary Rehabilitation and Prevention, 33(2), pp. 99-105.
Number of citations in Scopus 12
Number of citations in Web of Science® 11

2012

Al Mashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]. Springer, Germany, pp. 138-151.
Number of full-text downloads 129
Number of citations in Scopus 4

Hansen, Kim, Thom, Ogilvie, Rodda, Hamish, Price, Melanie, Jackson, Chris, Bennetts, Scott, et al. (2012) Impact of pain location, organ system and treating speciality on timely delivery of analgesia in emergency departments. EMA - Emergency Medicine Australasia, 24(1), pp. 64-71.
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Haerer, Wendy, Delbaere, Kim, Bartlett, Harry, Lord, Stephen, & Rowland, Jeffrey (2012) Relationships between HMG-CoA reductase inhibitors (statin) use and strength, balance and falls in older people. Internal Medicine Journal, 42(12), pp. 1329-1334.
Number of citations in Scopus 22
Number of citations in Web of Science® 19

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2012) Slide attacks on the Sfinks stream cipher. In Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 6th International Conference on Signal Processing and Communication Systems. IEEE, United States, pp. 1-10.
Number of full-text downloads 278
Number of citations in Scopus 1

Al Hamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, J & Thomborson, C (Eds.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125. Australian Computer Society, Australia, pp. 27-32.

2011

Al Mashrafi, Mufeed, Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Ed (2011) Algebraic analysis of the SSS stream cipher. In Babenko, L, Pieprzyk, J, Chefranov, A, & Shankaran, R (Eds.) Proceedings of the 4th International Conference on Security of Information and Networks. Association for Computing Machinery, United States, pp. 199-204.
Number of full-text downloads 143

Lewis, Peter, Bartlett, Harry, Townsend, Shane, Courtney, Mary, Mullany, Daniel, & Coyer, Fiona (2011) A prospective pilot study evaluating the 'cardiac decompensation score' in the setting of intraaortic balloon counterpulsation. Intensive and Critical Care Nursing, 27(1), pp. 31-36.
Number of full-text downloads 127
Number of citations in Scopus 1

Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al. (2011) Repeated six-minute walk tests for outcome measurement and exercise prescription in outpatient cardiac rehabilitation: A longitudinal study. Archives of Physical Medicine and Rehabilitation, 92(9), pp. 1388-1394.
Number of citations in Scopus 19
Number of citations in Web of Science® 16

Teo, Sui Guan, Al Hamdan, Ali, Bartlett, Harry, Simpson, Leonie, Wong, Kenneth, & Dawson, Ed (2011) State convergence in the initialisation of stream ciphers. In Hawkes, P & Parampalli, U (Eds.) Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings [Lecture Notes in Computer Science, Vol 6812]. Springer, Germany, pp. 75-88.
Number of full-text downloads 170
Number of citations in Scopus 3

2010

Strugnell, Wendy, Hamilton-Craig, Christian, Parry, Temeeka, Bartlett, Harry, & Slaughter, Richard (2010) Cardiac MRI is Superior to Gated Blood Pool Imaging in the Assessment of Left Function in Patients Post-cardiac Transplantation. Heart, Lung and Circulation, 19(7), pp. 400-405.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Fukushima, Satsuki, Tesar, Peter, Jalali, Homayoun, Clarke, Andrew, Sharma, Hemant, Choudhary, Jivesh, et al. (2010) Determinants of in-hospital and long-term surgical outcomes after repair of postinfarction ventricular septal rupture. Journal of Thoracic and Cardiovascular Surgery, 140(1), pp. 59-65.
Number of citations in Scopus 23
Number of citations in Web of Science® 23

2005

Strugnell, Wendy, Slaughter, Richard, Riley, Robyn, Trotter, Andrew, & Bartlett, Harold (2005) Modified RV Short Axis Series - A New Method for Cardiac MRI Measurement of Right Ventricular Volumes. Journal of Cardiovascular Magnetic Resonance, 7(5), pp. 769-774.
Number of citations in Web of Science® 35

1998

Bartlett, Harold John Gregory (1998) Reliability analysis with suspended items. PhD thesis, Queensland University of Technology.
Number of full-text downloads 442

This list was generated on Sun Jun 7 07:23:57 2020 AEST.