Seguir
Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Dirección de correo verificada de qut.edu.au
Título
Citado por
Citado por
Año
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
912013
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
852005
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
832000
LILI keystream generator
L Ruth Simpson, E Dawson, JD Golić, WL Millan
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001
772001
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
632002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
611998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
471999
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
352016
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
322002
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
292020
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
262019
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021
242021
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
212016
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
212013
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption
MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
IEEE Transactions on Dependable and Secure Computing, 2022
202022
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
171997
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
162000
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
152009
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
142017
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
142007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20