Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 66.

Add to Quick Collection   All 66 Results

Sort:
 Add All Items to Quick Collection
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/336156
Description: In this paper, we propose a new advanced malware that distributes its features to multiple software components in order to bypass various security policies such as application whitelisting and securit ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1045650
Description: We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to co ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/336167
Description: Today, healthcare service providers are increasingly making use of the cloud for hosting their services. Although such services are regulated by policies such as HIPAA and healthcare service providers ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/286161
Description: At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to r ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/262172
Description: Rakaposhi is a synchronous stream cipher, which uses three main components: a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering fu ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/281073
Description: In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to appl ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/206105
Description: RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is s ... More
Reviewed: Reviewed
Date: 2012
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/217278
Description: Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/152600
Description: In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks fo ... More
Reviewed: Reviewed
Date: 2011
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/150092
Description: This paper proposes a logic based framework that supports dynamic delegation for role based access control systems in a decentralised environment. It allows delegation of administrative privileges for ... More
Reviewed: Reviewed
Date: 2011
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/167109
Description: Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Ag ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117991
Description: We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocol ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/150641
Description: The theoretical study of the relational model of data is ongoing and highly developed. Yet the vast majority of real databases include incomplete data, and the incomplete data is widely modelled using ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/323071
Description: This paper describes an evaluation of the answerability of a set of clinical questions posed by physicians. The clinical questions belong to two categories of the five-leaf high-level hierarchical Evi ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118051
Description: 18 page(s)
Reviewed: Reviewed