


Остановите войну!
for scientists:
Douglas Stebila
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c66]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. EuroS&P Workshops 2022: 19-30 - [c65]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. Public Key Cryptography (2) 2022: 3-34 - [i56]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. IACR Cryptol. ePrint Arch. 2022: 337 (2022) - [i55]Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-possession for KEM certificates using verifiable generation. IACR Cryptol. ePrint Arch. 2022: 703 (2022) - 2021
- [j14]Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila:
Associative Blockchain for Decentralized PKI Transparency. Cryptogr. 5(2): 14 (2021) - [j13]Alfred Menezes
, Douglas Stebila:
Challenges in Cryptography. IEEE Secur. Priv. 19(2): 70-73 (2021) - [j12]Alfred Menezes
, Douglas Stebila:
End-to-End Security: When Do We Have It? IEEE Secur. Priv. 19(4): 60-64 (2021) - [j11]Alfred Menezes, Douglas Stebila:
The Advanced Encryption Standard: 20 Years Later. IEEE Secur. Priv. 19(6): 98-102 (2021) - [j10]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 34(4): 37 (2021) - [j9]Philip Hodges, Douglas Stebila:
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications. IACR Trans. Symmetric Cryptol. 2021(2): 389-422 (2021) - [c64]Bertram Poettering
, Paul Rösler
, Jörg Schwenk
, Douglas Stebila
:
SoK: Game-Based Security Models for Group Key Exchange. CT-RSA 2021: 148-176 - [c63]Peter Schwabe, Douglas Stebila, Thom Wiggers
:
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys. ESORICS (1) 2021: 3-22 - [c62]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. LATINCRYPT 2021: 67-87 - [c61]Nina Bindel, Douglas Stebila
, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. LATINCRYPT 2021: 168-188 - [c60]Edward Eaton, Douglas Stebila:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. PQCrypto 2021: 154-173 - [i54]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2021: 305 (2021) - [i53]Edward Eaton, Douglas Stebila:
The "quantum annoying" property of password-authenticated key exchange protocols. IACR Cryptol. ePrint Arch. 2021: 696 (2021) - [i52]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. IACR Cryptol. ePrint Arch. 2021: 769 (2021) - [i51]Peter Schwabe, Douglas Stebila, Thom Wiggers:
More efficient post-quantum KEMTLS with pre-distributed public keys. IACR Cryptol. ePrint Arch. 2021: 779 (2021) - [i50]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-Quantum Key-Blinding for Authentication in Anonymity Networks. IACR Cryptol. ePrint Arch. 2021: 963 (2021) - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [j8]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. J. Cryptol. 33(4): 1914-1983 (2020) - [j7]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. Proc. VLDB Endow. 13(11): 2132-2145 (2020) - [c59]Peter Schwabe, Douglas Stebila, Thom Wiggers
:
Post-Quantum TLS Without Handshake Signatures. CCS 2020: 1461-1480 - [c58]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. DPM/CBT@ESORICS 2020: 89-107 - [c57]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-quantum Cryptography in TLS. PQCrypto 2020: 72-91 - [c56]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. SAC 2020: 404-430 - [e2]Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i49]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. CoRR abs/2003.09481 (2020) - [i48]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. CoRR abs/2009.00086 (2020) - [i47]Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-quantum TLS without handshake signatures. IACR Cryptol. ePrint Arch. 2020: 534 (2020) - [i46]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. IACR Cryptol. ePrint Arch. 2020: 1044 (2020) - [i45]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved attacks against key reuse in learning with errors key exchange. IACR Cryptol. ePrint Arch. 2020: 1288 (2020)
2010 – 2019
- 2019
- [c55]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [i44]Jörg Schwenk, Douglas Stebila:
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. IACR Cryptol. ePrint Arch. 2019: 777 (2019) - [i43]Eric Crockett, Christian Paquin, Douglas Stebila:
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. IACR Cryptol. ePrint Arch. 2019: 858 (2019) - [i42]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2019: 1356 (2019) - [i41]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-Quantum Cryptography in TLS. IACR Cryptol. ePrint Arch. 2019: 1447 (2019) - 2018
- [i40]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [j6]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j5]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c54]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c53]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. EuroS&P 2017: 451-466 - [c52]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c51]Nina Bindel, Udyani Herath, Matthew McKague
, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017: 384-405 - [i39]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. IACR Cryptol. ePrint Arch. 2017: 460 (2017) - 2016
- [j4]Mark Manulis
, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c50]Farhad Moghimifar, Douglas Stebila:
Predicting TLS performance from key exchange performance: short paper. ACSW 2016: 44 - [c49]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c48]Joppe W. Bos
, Craig Costello, Léo Ducas, Ilya Mironov
, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. CCS 2016: 1006-1018 - [c47]Colin Boyd, Britta Hale
, Stig Frode Mjølsnes
, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c46]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. ESORICS (2) 2016: 140-158 - [c45]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. EUROCRYPT (1) 2016: 670-698 - [c44]Douglas Stebila, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. SAC 2016: 14-37 - [c43]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. USENIX Security Symposium 2016: 823-840 - [i38]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptol. ePrint Arch. 2016: 81 (2016) - [i37]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. IACR Cryptol. ePrint Arch. 2016: 87 (2016) - [i36]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. IACR Cryptol. ePrint Arch. 2016: 452 (2016) - [i35]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptol. ePrint Arch. 2016: 659 (2016) - [i34]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. IACR Cryptol. ePrint Arch. 2016: 1013 (2016) - [i33]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptol. ePrint Arch. 2016: 1016 (2016) - [i32]Douglas Stebila, Michele Mosca:
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. IACR Cryptol. ePrint Arch. 2016: 1017 (2016) - 2015
- [c42]Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ACISP 2015: 270-288 - [c41]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. CCS 2015: 1197-1210 - [c40]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c39]Gus Gutoski, Douglas Stebila:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. Financial Cryptography 2015: 497-504 - [c38]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMACC 2015: 277-294 - [c37]Joppe W. Bos
, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. IEEE Symposium on Security and Privacy 2015: 553-570 - [c36]Douglas Stebila, Nick Sullivan:
An Analysis of TLS Handshake Proxying. TrustCom/BigDataSE/ISPA (1) 2015: 279-286 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - [i31]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. IACR Cryptol. ePrint Arch. 2015: 171 (2015) - [i30]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptol. ePrint Arch. 2015: 335 (2015) - [i29]Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. IACR Cryptol. ePrint Arch. 2015: 652 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptol. ePrint Arch. 2015: 914 (2015) - [i27]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i26]Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. IACR Cryptol. ePrint Arch. 2015: 1157 (2015) - 2014
- [j3]Mark Manulis
, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c35]Janaka Alawatugoda
, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c34]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c33]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c32]Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. CCS 2014: 369-381 - [c31]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c30]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [i25]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptol. ePrint Arch. 2014: 131 (2014) - [i24]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptol. ePrint Arch. 2014: 264 (2014) - [i23]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. IACR Cryptol. ePrint Arch. 2014: 599 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 724 (2014) - [i21]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptol. ePrint Arch. 2014: 731 (2014) - [i20]Gus Gutoski, Douglas Stebila:
Hierarchical deterministic Bitcoin wallets that tolerate key leakage. IACR Cryptol. ePrint Arch. 2014: 998 (2014) - 2013
- [j2]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu
:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2): 245-269 (2013) - [j1]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [c29]Leah F. South
, Douglas Stebila:
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. ACISP 2013: 388-402 - [c28]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the security of TLS renegotiation. CCS 2013: 387-398 - [c27]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116 - [c26]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum One-Time Programs - (Extended Abstract). CRYPTO (2) 2013: 344-360 - [c25]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c24]Majid Arianezhad, Douglas Stebila, Behzad Mozaffari:
Usability and Security of Gaze-Based Graphical Grid Passwords. Financial Cryptography Workshops 2013: 17-33 - [c23]Michele Mosca, Douglas Stebila, Berkant Ustaoglu
:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. PQCrypto 2013: 136-154 - [i19]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. IACR Cryptol. ePrint Arch. 2013: 333 (2013) - [i18]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. IACR Cryptol. ePrint Arch. 2013: 343 (2013) - [i17]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - [i16]Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-ciphersuite security and the SSH protocol. IACR Cryptol. ePrint Arch. 2013: 813 (2013) - 2012
- [c22]Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy
:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c21]Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c20]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [c19]Reza Hassanzadeh, Richi Nayak
, Douglas Stebila:
Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks. WISE 2012: 624-630 - [i15]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. CoRR abs/1211.1080 (2012) - [i14]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i13]Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. IACR Cryptol. ePrint Arch. 2012: 361 (2012) - [i12]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptol. ePrint Arch. 2012: 559 (2012) - [i11]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the Security of TLS Renegotiation. IACR Cryptol. ePrint Arch. 2012: 630 (2012) - 2011
- [c18]Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c17]Douglas Stebila, Lakshmi Kuppusamy
, Jothi Rangasamy
, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c16]Jothi Rangasamy
, Douglas Stebila, Lakshmi Kuppusamy
, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. ICISC 2011: 319-331 - [c15]Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu:
Defending Web Services against Denial of Service Attacks Using Client Puzzles. ICWS 2011: 25-32 - [c14]Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - [i10]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. IACR Cryptol. ePrint Arch. 2011: 665 (2011) - [i9]Kevin M. Igoe, Douglas Stebila:
X.509v3 Certificates for Secure Shell Authentication. RFC 6187: 1-16 (2011) - 2010
- [c13]Kenneth G. Paterson, Douglas Stebila:
One-Time-Password-Authenticated Key Exchange. ACISP 2010: 264-281 - [c12]James Birkett, Douglas Stebila:
Predicate-Based Key Exchange. ACISP 2010: 282-299 - [c11]Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz:
Multi-Factor Password-Authenticated Key Exchange. AISC 2010: 56-66 - [c10]Craig Costello, Douglas Stebila:
Fixed Argument Pairings. LATINCRYPT 2010: 92-108 - [c9]Douglas Stebila:
Reinforcing bad behaviour: the misuse of security indicators on popular websites. OZCHI 2010: 248-251 - [i8]