Follow
Leonie Simpson
Leonie Simpson
Associate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIA
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
982013
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
862005
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
862000
LILI keystream generator
L Ruth Simpson, E Dawson, JD Golić, WL Millan
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001
802001
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
632002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
621998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
571999
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
412020
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
412016
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021
342021
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
332002
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
312019
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption
MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
IEEE Transactions on Dependable and Secure Computing 20 (3), 1799-1817, 2022
282022
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
252013
Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia
W Alkalabi, L Simpson, H Morarji
Proceedings of the 2021 Australasian Computer Science Week Multiconference, 1-8, 2021
222021
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
222016
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
KF Hasan, L Simpson, MAR Baee, C Islam, Z Rahman, W Armstrong, ...
IEEE Access, 2024
192024
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
171997
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
162000
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20