Jason Smith

Affiliations:
  • Queensland University of Technology, Brisbane, Australia


According to our database1, Jason Smith authored at least 11 papers between 2003 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Risk Modelling the Transition of SCADA System to IPv6.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Modeling and Verification of Privacy Enhancing Protocols.
Proceedings of the Formal Methods and Software Engineering, 2009

2008
A User-Centric Protocol for Conditional Anonymity Revocation.
Proceedings of the Trust, 2008

Conditional Privacy Using Re-encryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2007
Denial-of-service resistance in key establishment.
Int. J. Wirel. Mob. Comput., 2007

2006
Modelling denial of service attacks on JFK with Meadows's cost-based framework.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Specification-Based Intrusion Detection in WLANs.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2004
Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004

2003
Security as a Safety Issue in Rail Communications.
Proceedings of the Safety Critical Systems and Software 2003, 2003

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...