Leonie Ruth Simpson
Orcid: 0000-0001-8434-9741
According to our database1,
Leonie Ruth Simpson
authored at least 77 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
5
3
3
2
3
3
2
1
1
3
1
2
1
1
1
1
1
3
4
1
2
2
2
1
3
3
5
3
3
1
1
2
1
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework.
IEEE Open J. Comput. Soc., 2024
IEEE Open J. Comput. Soc., 2024
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023
IEEE Access, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Proceedings of the IEEE International Conference on Trust, 2022
2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability.
Proceedings of the ASSETS '21: The 23rd International ACM SIGACCESS Conference on Computers and Accessibility, 2021
Barriers and Incentives to Cybersecurity Threat Information Sharing in Developing Countries: A Case Study of Saudi Arabia.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021
2020
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).
IACR Cryptol. ePrint Arch., 2020
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020
Proceedings of the Applications and Techniques in Information Security, 2020
Proceedings of the Australasian Computer Science Week, 2020
Proceedings of the Australasian Computer Science Week, 2020
2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
J. Math. Cryptol., 2018
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
2014
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2004
Proceedings of the Information Security and Cryptology, 2004
Perspectives on Word Based Stream Ciphers.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
2003
Proceedings of the Information Security and Cryptology, 2003
2002
Analysis of a measure of correlation between two binary strings of different lengths.
Australas. J Comb., 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
1999
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997