Follow
Leonie Simpson
Leonie Simpson
Associate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIA
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
922013
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
852000
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
842005
LILI keystream generator
L Ruth Simpson, E Dawson, JD Golić, WL Millan
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001
782001
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
632002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
611998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
541999
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
412016
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
352020
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
332002
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
282019
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021
262021
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption
MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
IEEE Transactions on Dependable and Secure Computing 20 (3), 1799-1817, 2022
222022
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
222016
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
222013
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
171997
Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia
W Alkalabi, L Simpson, H Morarji
Proceedings of the 2021 Australasian Computer Science Week Multiconference, 1-8, 2021
162021
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
162000
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
152009
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
142007
The system can't perform the operation now. Try again later.
Articles 1–20