Detecting relay attacks with timing-based protocols J Reid, JMG Nieto, T Tang, B Senadji Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 285 | 2007 |
Round-optimal contributory conference key agreement C Boyd, JMG Nieto International Workshop on Public Key Cryptography, 161-174, 2002 | 219 | 2002 |
Secure data aggregation in wireless sensor network: a survey H Al Zaid, E Foo, J Gonzalez Nieto Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008 | 166 | 2008 |
Strongly secure certificateless key agreement G Lippold, C Boyd, J Gonzalez Nieto International conference on pairing-based cryptography, 206-230, 2009 | 136 | 2009 |
Efficient one-round key exchange in the standard model C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008 | 131 | 2008 |
SKMA-A key management architecture for SCADA systems R Dawson, C Boyd, E Dawson, J Gonzalez Nieto ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006 | 130 | 2006 |
Security-mediated certificateless cryptography SSM Chow, C Boyd, JMG Nieto Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 117 | 2006 |
Towards secure and legal e-tendering M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ... Journal of Information Technology in Construction 11 (e-Commerce in …, 2006 | 90 | 2006 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 87 | 2008 |
Privacy and trusted computing J Reid, JMG Nieto, E Dawson, E Okamoto 14th International Workshop on Database and Expert Systems Applications …, 2003 | 76 | 2003 |
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011 | 75 | 2011 |
Attribute-based authenticated key exchange MC Gorantla, C Boyd, JM González Nieto Australasian Conference on Information Security and Privacy, 300-317, 2010 | 74 | 2010 |
Geoproof: Proofs of geographic location for cloud computing environment A Albeshri, C Boyd, JG Nieto 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 70 | 2012 |
Toward non-parallelizable client puzzles S Tritilanunt, C Boyd, E Foo, JM González Nieto Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007 | 65 | 2007 |
Who is more susceptible to phishing emails?: a Saudi Arabian study I Alseadoon, T Chan, E Foo, J Gonzalez Nieto | 63 | 2012 |
RSDA: Reputation-based secure data aggregation in wireless sensor networks H Alzaid, E Foo, JG Nieto 2008 Ninth International Conference on Parallel and Distributed Computing …, 2008 | 60 | 2008 |
One-round key exchange in the standard model C Boyd, Y Cliff, JMG Nieto, KG Paterson International Journal of Applied Cryptography 1 (3), 181-199, 2009 | 52 | 2009 |
Low-cost and strong-security RFID authentication protocol JC Ha, SJ Moon, JMG Nieto, C Boyd Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007 | 50 | 2007 |
ID-based one-pass authenticated key establishment C Gorantla, C Boyd, J Gonzalez Nieto Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008 | 44 | 2008 |
Modelling denial of service attacks on JFK with Meadows's cost-based framework J Smith, JM Gonzalez-Nieto, C Boyd Proceedings of the 2006 Australasian workshops on Grid computing and e …, 2006 | 44 | 2006 |