Security and Privacy in eHealth: Is it possible? T Sahama, L Simpson, B Lane 2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013 | 92 | 2013 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 85 | 2005 |
The LILI-128 keystream generator E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson Proceedings of first NESSIE Workshop, 2000 | 84 | 2000 |
LILI keystream generator L Ruth Simpson, E Dawson, JD Golić, WL Millan Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001 | 77 | 2001 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 63 | 2002 |
A probabilistic correlation attack on the shrinking generator L Simpson, JD Golić, E Dawson Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998 | 61 | 1998 |
Cryptanalysis of ORYX D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999 | 47 | 1999 |
Investigating cube attacks on the authenticated encryption stream cipher ACORN MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong International Conference on Applications and Techniques in Information …, 2016 | 35 | 2016 |
Continuous authentication for VANET B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk Vehicular Communications 25, 100255, 2020 | 32 | 2020 |
Analysis and design issues for synchronous stream ciphers E Dawson, L Simpson Coding Theory and Cryptology, 49-90, 2002 | 32 | 2002 |
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2 MAR Baee, L Simpson, E Foo, J Pieprzyk IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019 | 28 | 2019 |
Authentication strategies in vehicular communications: a taxonomy and framework MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021 | 25 | 2021 |
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk IEEE Transactions on Dependable and Secure Computing, 2022 | 22 | 2022 |
Finding state collisions in the authenticated encryption stream cipher ACORN MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016 | 22 | 2016 |
Key derivation function: the SCKDF scheme CW Chuah, E Dawson, L Simpson Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 21 | 2013 |
Fast correlation attacks on nonlinear filter generators JD Golić, M Salmasizadeh, L Simpson, E Dawson Information processing letters 64 (1), 37-42, 1997 | 17 | 1997 |
Designing boolean functions for cryptographic applications E Dowson, W Millan, L Simpson Contributions to General Algebra 12 (1), 2000 | 16 | 2000 |
Improved cryptanalysis of the common scrambling algorithm stream cipher L Simpson, M Henricksen, WS Yap Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 15 | 2009 |
Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia W Alkalabi, L Simpson, H Morarji Proceedings of the 2021 Australasian Computer Science Week Multiconference, 1-8, 2021 | 14 | 2021 |
Investigating cube attacks on the authenticated encryption stream cipher MORUS I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong 2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017 | 14 | 2017 |