Follow
Leonie Simpson
Leonie Simpson
Associate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIA
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
952013
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
862005
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE workshop, 2000
862000
LILI keystream generator
L Ruth Simpson, E Dawson, JD Golić, WL Millan
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001
832001
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
641998
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
622002
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
571999
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
412020
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
402016
Authentication strategies in vehicular communications: A taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021
362021
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
332002
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
312019
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption
MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
IEEE Transactions on Dependable and Secure Computing 20 (3), 1799-1817, 2022
272022
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
272013
A framework for migrating to post-quantum cryptography: Security dependency analysis and case studies
KF Hasan, L Simpson, MAR Baee, C Islam, Z Rahman, W Armstrong, ...
IEEE Access 12, 23427-23450, 2024
232024
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
222016
Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia
W Alkalabi, L Simpson, H Morarji
Proceedings of the 2021 Australasian Computer Science Week Multiconference, 1-8, 2021
212021
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
171997
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
162000
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20