Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 61 - 75 of 312.

Add to Quick Collection   All 312 Results

Sort:
 Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118006
Description: Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate t ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/126214
Description: This chapter presents security models for confidentiality and unforgeability of signcryption schemes in the multi-user setting. A family of security models for signcryption in both two-user and multi- ... More
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/128916
Description: We obtain upper bounds for the number of arbitrary and symmetric matrices with integer entries in a given box (in an arbitrary location) and a given determinant. We then apply these bounds to estimate ... More
Reviewed: Reviewed
Authors: Mathieson, Luke
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/137046
Description: We examine the parameterized complexity of the problem of editing a graph to obtain an r-degenerate graph. We show that for the editing operations vertex deletion and edge deletion, both separately an ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/120153
Description: Chaum’s Dining Cryptographers protocol crystallises the essentials of security just as other famous diners once demonstrated deadlock and livelock: it is a benchmark for security models and their asso ... More
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/347116
Description: In this paper we focus on the relationship between a number of specification models. The models are formulated in the Unifying Theories of Programming of Hoare and He, but correspond to widely used sp ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1228538
Description: Probabilistic B (pB) [2,8] extends classical B [7] to incorporate probabilistic updates together with the specification of quantitative safety properties. As for classical B, probabilistic B formulate ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/120207
Description: Along with the massive growth in Internet commerce over the last ten years there has been a corresponding boom in Internet related crime, or cybercrime. According to research recently released by the ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117382
Description: We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/139294
Description: A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/88214
Description: 7 page(s)
Authors: Duckworth, W | Mans, B
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/114417
Description: Available online 22 July 2008.
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117574
Description: We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/163467
Description: This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and cryptography. We present va ... More
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148346
Description: 16 page(s)
Reviewed: Reviewed