Deputy Vice-Chancellor Finance


TitleDeputy Vice-Chancellor Finance
AlternativeEXC - DVC Fin
DepartmentExecutive

Latest research outputs

Sort by Date Title
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.

Article

Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.

Article

Attacks on an ISO/IEC 11770-2 key establishment protocol
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.

Article

Remove key escrow from the identity-based encryption system.
Comley, R., Vasiu, L. and Cheng, Z. 2004. Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings.. 3 (3), pp. 37-50.

Article

Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach
Anishenko, S., Osimov, V., Shaposhnikov, D., Podladchikova, L., Comley, R. and Gao, X. 2008. Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach. Puuronen, S., Pechenizkiy, M., Tsymbal, A. and Lee, D. (ed.) 21st IEEE International Symposium on Computer-Based Medical Systems. Jyvaskyla, Finland 17 - 19 Jun 2008 IEEE Computer Society. pp. 50-52 https://doi.org/10.1109/CBMS.2008.19

Conference paper

General and efficient Certificateless Public Key Encryption constructions
Comley, R., Cheng, Z., Chen, L. and Ling, L. 2007. General and efficient Certificateless Public Key Encryption constructions. Takagi, T., Okamoto, T., Okamoto. E. and Okamoto, T. (ed.) Pairing-Based Cryptography - Pairing 2007. First International Conference. Tokyo, Japan 02 - 04 Jul 2007 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-540-73489-5_6

Conference item

Identity-based key agreement with unilateral identity privacy using pairings
Comley, R., Chen, L., Tang, Q. and Cheng, Z. 2006. Identity-based key agreement with unilateral identity privacy using pairings. Chen, K., Deng, R., Lai, X. and Zhou, J. (ed.) Information Security Practice and Experience: Second International Conference, ISPEC 2006. Hangzhou, China 11 - 14 Apr 2006 Berlin, Heidelberg Springer. https://doi.org/10.1007/11689522_19

Conference item