default search action
Ernest Foo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
A graph representation framework for encrypted network traffic classification. Comput. Secur. 148: 104134 (2025) - 2024
- [j39]Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, Mukhtar Hussain, Ernest Foo:
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey. J. Inf. Secur. Appl. 83: 103786 (2024) - [j38]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. IEEE Trans. Dependable Secur. Comput. 21(4): 4066-4083 (2024) - [j37]Mukhtar Hussain, Shantanu Pal, Zahra Jadidi, Ernest Foo, Salil S. Kanhere:
Federated Zero Trust Architecture using Artificial Intelligence. IEEE Wirel. Commun. 31(2): 30-35 (2024) - 2023
- [j36]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
Software Vulnerability Detection Using Informed Code Graph Pruning. IEEE Access 11: 135626-135644 (2023) - [j35]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering a data interpreted petri net model of industrial control systems for anomaly detection. Expert Syst. Appl. 230: 120511 (2023) - [j34]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 1799-1817 (2023) - [c74]Ernest Foo, Qinyi Li:
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model. ACISP 2023: 381-402 - [c73]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. ACISP 2023: 630-650 - [c72]Jacob Soper, Yue Xu, Kien Nguyen, Ernest Foo, Zahra Jadidi:
A two-pass approach for minimising error in synthetically generated network traffic data sets. ACSW 2023: 18-27 - [c71]Ayodeji James Akande, Zhe Hou, Ernest Foo, Qinyi Li:
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning. ICFEM 2023: 273-278 - [c70]Zahra Jadidi, Shantanu Pal, Qinyi Li, Ernest Foo:
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust. ICST 2023: 1-6 - [c69]Shantanu Pal, Zahra Jadidi, Poopak Alaeifar, Ernest Foo:
The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence. ICST 2023: 1-6 - 2022
- [j33]Xuelei Wang, Colin J. Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li:
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems. IEEE Access 10: 6629-6649 (2022) - [j32]Alvin DMello, Dhammika Jayalath, Ernest Foo, Jason Reid:
Machine Learning to Optimize TCP Communications Over High Frequency Communications Links. IEEE Access 10: 125526-125537 (2022) - [j31]Darshika Niranjan Koggalahewa, Yue Xu, Ernest Foo:
An unsupervised method for social network spammer detection based on user information interests. J. Big Data 9(1): 7 (2022) - [j30]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control. IEEE Trans. Ind. Informatics 18(6): 3734-3743 (2022) - [c68]Ojaswini Malhotra, Sharmistha Dey, Ernest Foo, Mardé Helbig:
Cybersecurity Maturity Model Capability in Aviation and Railway Industry. ACIS 2022: 23 - [c67]Zulu Okonkwo, Ernest Foo, Qinyi Li, Zhe Hou:
A CNN Based Encrypted Network Traffic Classifier. ACSW 2022: 74-83 - [c66]Zhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza:
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks. ICECCS 2022: 117-122 - [c65]Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam:
Design and Development of Automated Threat Hunting in Industrial Control Systems. PerCom Workshops 2022: 618-623 - [c64]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. TrustCom 2022: 1522-1527 - [i3]Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam:
Design and Development of Automated Threat Hunting in Industrial Control Systems. CoRR abs/2202.01543 (2022) - [i2]Tianyu Zhao, Ernest Foo, Hui Tian:
A Digital Twin Framework for Cyber Security in Cyber-Physical Systems. CoRR abs/2204.13859 (2022) - [i1]Lincoln Best, Ernest Foo, Hui Tian:
A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection. CoRR abs/2205.04005 (2022) - 2021
- [j29]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
Authentication strategies in vehicular communications: a taxonomy and framework. EURASIP J. Wirel. Commun. Netw. 2021(1): 129 (2021) - [j28]Qinyi Li, Xavier Boyen, Ernest Foo:
CCA-security from adaptive all-but-one lossy trapdoor functions. Theor. Comput. Sci. 883: 99-121 (2021) - [j27]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! IEEE Trans. Inf. Forensics Secur. 16: 3678-3693 (2021) - [j26]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. IEEE Trans. Veh. Technol. 70(9): 9306-9319 (2021) - [c63]Ojaswini Malhotra, Sharmistha Dey, Ernest Foo, Mardé Helbig:
Cyber Security Maturity Model Capability at The Airports. ACIS 2021: 55 - [c62]Xavier Boyen, Ernest Foo, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. ACISP 2021: 630-649 - [c61]Darshika N. Koggalahewa, Yue Xu, Ernest Foo:
A Drift Aware Hierarchical Test Based Approach for Combating Social Spammers in Online Social Networks. AusDM 2021: 47-61 - 2020
- [j25]Aklilu Daniel Tesfamicael, Vicky Liu, Matthew McKague, William J. Caelli, Ernest Foo:
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market. IEEE Access 8: 132424-132445 (2020) - [j24]Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Josef Pieprzyk:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. IEEE Trans. Inf. Forensics Secur. 15: 3107-3122 (2020) - [j23]Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Leonie Simpson, Mir Ali Rezazadeh Baee, Josef Pieprzyk:
Continuous authentication for VANET. Veh. Commun. 25: 100255 (2020) - [c60]Darshika Niranjan Koggalahewa, Yue Xu, Ernest Foo:
Spam Detection in Social Networks based on Peer Acceptance. ACSW 2020: 8:1-8:7 - [c59]Jayamine Alupotha, Xavier Boyen, Ernest Foo:
Compact Multi-Party Confidential Transactions. CANS 2020: 430-452 - [c58]Alvin DMello, Ernest Foo, Jason Reid, Dhammika Jayalath:
On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems. MilCIS 2020: 1-7 - [c57]Darshika N. Koggalahewa, Yue Xu, Ernest Foo:
Two-stage Unsupervised Approach for Combating Social Spammers. SSCI 2020: 71-78
2010 – 2019
- 2019
- [j22]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Extending the cyber-attack landscape for SCADA-based critical infrastructure. Int. J. Crit. Infrastructure Prot. 25: 14-35 (2019) - [j21]Mir Ali Rezazadeh Baee, Leonie Simpson, Ernest Foo, Josef Pieprzyk:
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 68(12): 11577-11587 (2019) - [c56]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, Bill Caelli:
QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud. ACSW 2019: 10:1-10:9 - [c55]Mukhtar Hussain, Ernest Foo, Suriadi Suriadi:
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection. FIT 2019: 150-155 - 2018
- [j20]David Myers, Suriadi Suriadi, Kenneth Radke, Ernest Foo:
Anomaly detection for industrial control systems using process mining. Comput. Secur. 78: 103-125 (2018) - [j19]Hassan Fareed M. Lahza, Kenneth Radke, Ernest Foo:
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols. Int. J. Crit. Infrastructure Prot. 20: 48-67 (2018) - [c54]Ngoc Tu Pham, Ernest Foo, Suriadi Suriadi, Helen Jeffrey, Hassan Fareed M. Lahza:
Improving performance of intrusion detection system using ensemble methods and feature selection. ACSW 2018: 2:1-2:6 - [c53]Alvin DMello, Ernest Foo, Jason Reid:
Characterizing TCP/IP for High Frequency Communication Systems. MilCIS 2018: 1-7 - [c52]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, Bill Caelli:
Modeling for a QoS-Efficient Real-Time Video Conferencing System in the Cloud. SoftCOM 2018: 1-6 - [c51]Xuelei Wang, Ernest Foo:
Assessing Industrial Control System Attack Datasets for Intrusion Detection. SSIC 2018: 1-8 - [e2]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- [c50]Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo:
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure. ACISP (2) 2017: 452-459 - [c49]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Framework for SCADA cyber-attack dataset creation. ACSW 2017: 69:1-69:10 - [c48]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, William J. Caelli:
Modeling for performance and security balanced trading communication systems in the cloud. IPCCC 2017: 1-7 - [c47]David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo:
Process Discovery for Industrial Control System Cyber Attack Detection. SEC 2017: 61-75 - [c46]Michelle Fernando, Dhammika Jayalath, Seyit Camtepe, Ernest Foo:
Reed Solomon Codes for the Reconciliation of Wireless PHY Layer Based Secret Keys. VTC Fall 2017: 1-6 - 2016
- [j18]Jonathan J. Davis, Ernest Foo:
Automated feature engineering for HTTP tunnel detection. Comput. Secur. 59: 166-185 (2016) - [j17]Chris I. Djamaludin, Ernest Foo, Seyit Ahmet Çamtepe, Peter Corke:
Revocation and update of trust in autonomous delay tolerant networks. Comput. Secur. 60: 15-36 (2016) - [j16]Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe, Ernest Foo, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. ACM Comput. Surv. 48(4): 64:1-64:36 (2016) - [j15]Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo:
Formal modelling and analysis of DNP3 secure authentication. J. Netw. Comput. Appl. 59: 345-360 (2016) - [j14]Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo:
Securing DNP3 Broadcast Communications in SCADA Systems. IEEE Trans. Ind. Informatics 12(4): 1474-1485 (2016) - [c45]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
DNP3 network scanning and reconnaissance for critical infrastructure. ACSW 2016: 39 - [c44]Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo:
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. NSS 2016: 499-506 - 2015
- [j13]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of two authorization protocols using Colored Petri Nets. Int. J. Inf. Sec. 14(3): 221-247 (2015) - [c43]Ayodeji James Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c42]David Myers, Ernest Foo, Kenneth Radke:
Internet-wide Scanning Taxonomy and Framework. AISC 2015: 61-65 - [c41]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. AISC 2015: 67-70 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - 2014
- [j12]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Security properties analysis in a TPM-based protocol. Int. J. Secur. Networks 9(2): 85-103 (2014) - [c40]Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo:
Poisoned GOOSE: Exploiting the GOOSE Protocol. AISC 2014: 17-22 - [c39]Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji James Akande, Ernest Foo:
Practical Modbus Flooding Attack and Detection. AISC 2014: 57-65 - [c38]Raphael Amoah, Suriadi Suriadi, Seyit Ahmet Çamtepe, Ernest Foo:
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. ICC 2014: 827-833 - 2013
- [j11]Chris I. Djamaludin, Ernest Foo, Peter I. Corke:
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI. Comput. Secur. 39: 299-314 (2013) - [j10]Andrew White, Bradley L. Schatz, Ernest Foo:
Integrity verification of user space code. Digit. Investig. 10(Supplement): S59-S68 (2013) - [j9]Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris:
Cyber security of networked critical infrastructures [Guest Editorial]. IEEE Netw. 27(1): 3-4 (2013) - [c37]Ibrahim Mohammed Alseadoon, Mohd Fairuz Iskandar Othman, Ernest Foo, Taizan Chan:
Typology of phishing email victims based on their behavioural response. AMCIS 2013 - [c36]Ernest Foo, Mark Branagan, Thomas Morris:
A Proposed Australian Industrial Control System Security Curriculum. HICSS 2013: 1754-1762 - [c35]Elena Sitnikova, Ernest Foo, Rayford B. Vaughn:
The Power of Hands-On Exercises in SCADA Cyber Security Education. World Conference on Information Security Education 2013: 83-94 - 2012
- [j8]Andrew White, Bradley L. Schatz, Ernest Foo:
Surveying the user space through user allocations. Digit. Investig. 9(Supplement): S3-S12 (2012) - [j7]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, DongGook Park:
A taxonomy of secure data aggregation in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 8(1/2): 101-148 (2012) - [j6]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed:
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Secur. Commun. Networks 5(2): 125-144 (2012) - [j5]Suriadi Suriadi, Chun Ouyang, Ernest Foo:
Privacy Compliance Verification in Cryptographic Protocols. Trans. Petri Nets Other Model. Concurr. 6: 251-276 (2012) - [c34]Ibrahim Mohammed Alseadoon, Taizan Chan, Ernest Foo, Juan Manuel González Nieto:
Who is more susceptible to phishing emails?: A Saudi Arabian study. ACIS 2012 - [c33]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. AISC 2012: 47-58 - 2011
- [c32]Mohd Fairuz Iskandar Othman, Taizan Chan, Ernest Foo:
IT Governance Adoption in Malaysia: A Preliminary Investigation. ACIS 2011 - 2010
- [c31]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo:
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. AINA 2010: 859-865 - [c30]Rouhshi Low, Mark Burdon, Sharon Christensen, William D. Duncan, Paul Barnes, Ernest Foo:
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response. ISTAS 2010: 411-418
2000 – 2009
- 2009
- [j4]Suriadi Suriadi, Ernest Foo, Audun Jøsang:
A user-centric federated single sign-on system. J. Netw. Comput. Appl. 32(2): 388-401 (2009) - [c29]Suriadi Suriadi, Chun Ouyang, Jason Smith, Ernest Foo:
Modeling and Verification of Privacy Enhancing Protocols. ICFEM 2009: 127-146 - [c28]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Colin Boyd, Ernest Foo:
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA. S-CUBE 2009: 66-82 - 2008
- [j3]Rong Du, Ernest Foo, Colin Boyd:
Designing a secure e-tender submission protocol. Electron. Commer. Res. 8(3): 115-142 (2008) - [c27]Suriadi Suriadi, Ernest Foo, Rong Du:
Layered Identity Infrastructure Model for Identity Meta Systems. AISC 2008: 83-92 - [c26]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
Secure Data Aggregation in Wireless Sensor Network: a survey. AISC 2008: 93-105 - [c25]Mohammed Alzomai, Audun Jøsang, Adrian McCullagh, Ernest Foo:
Strengthening SMS-Based Authentication through Usability. ISPA 2008: 683-688 - [c24]Suriadi Suriadi, Ernest Foo, Jason Smith:
Conditional Privacy Using Re-encryption. NPC Workshops 2008: 18-25 - [c23]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424 - [c22]Suriadi Suriadi, Ernest Foo, Jason Smith:
A User-Centric Protocol for Conditional Anonymity Revocation. TrustBus 2008: 185-194 - 2007
- [j2]Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo:
Denial-of-service resistance in key establishment. Int. J. Wirel. Mob. Comput. 2(1): 59-71 (2007) - [c21]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 - [c20]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 - 2006
- [j1]Martin P. Betts, Peter Black, Sharon Christensen, Ed Dawson, Rong Du, William D. Duncan, Ernest Foo, Juan Manuel González Nieto:
Towards Secure and Legal E-Tendering. J. Inf. Technol. Constr. 11: 89-102 (2006) - [c19]Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering. ACSW 2006: 155-164 - [c18]Kevin Tham, Mark Looi, Ernest Foo:
Ubiquitous Authorization Scheme Based on Device Profile. EUC Workshops 2006: 312-321 - [c17]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 - [c16]Rong Du, Colin Boyd, Ernest Foo:
A Secure E-Tender Submission Protocol. TrustBus 2006: 213-222 - 2005
- [c15]Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:
Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 - 2004
- [c14]Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 - [c13]Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:
Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294 - [c12]Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald:
Defining Security Services for Electronic Tendering. ACSW 2004: 43-52 - [c11]Matthew Henricksen, Ming Yao, Ernest Foo:
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124 - [c10]Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 - [c9]Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141 - 2003
- [c8]Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285 - 2000
- [c7]Ernest Foo, Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design. ACISP 2000: 134-148 - [c6]Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. ISW 2000: 149-163
1990 – 1999
- 1999
- [c5]Colin Boyd, Ernest Foo, Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures. ACISP 1999: 244-257 - [c4]Chris Pavlovski, Colin Boyd, Ernest Foo:
Detachable Electronic Coins. ICICS 1999: 54-70 - 1998
- [c3]Colin Boyd, Ernest Foo:
Off-Line Fair Payment Protocols Using Convertible Signatures. ASIACRYPT 1998: 271-285 - [c2]Ernest Foo, Colin Boyd:
A Payment Scheme Using Vouchers. Financial Cryptography 1998: 103-121 - 1997
- [c1]Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint