Lawries Research Papers
Most of Dr Lawrie Brown's
research papers and technical reports are listed below,
with the more recent papers in web form.
Information is also available on Lawrie's
general research interests, and on his
2010,
2002 &
1997 sabbaticals
involving research on proxy certificates, mobile code security,
and block cipher design.
- Anne G. Bowitz, Espen G. Graarud, Lawrie Brown, Martin G. Jaatun,
A New Dawn for the Dark Knight: Securing BATMAN,
in
Journal of Information Security Research, vol 2 num 3,
September 2011, pp118-128, Digital Information Research Foundation, India
and USA, Chennai, India.
- Anne G. Bowitz, Espen G. Graarud, Lawrie Brown, Martin G. Jaatun,
BatCave: Adding Security to the BATMAN Protocol
(abstract) presented at the
Sixth International Conference on Digital
Information Management (ICDIM 2011) at Trinity College, University of
Melbourne, Australia in Sept 2011. Conference proceedings are published in
IEEE Xplore.
- Grigori Goldman and Lawrie Brown, Analysis of the
Periodical Payment Framework using Restricted Proxy Certificates,
presented at the
Thirty-Third Australasian Computer Science Conference (ACSC2010),
Brisbane, Australia; and published in
Conferences in Research
and Practice in Information Technology (CRPIT), Vol. 102, Jan 2010,
B. Mans and M. Reynolds, eds.
- Yinan Yang, Ed Lewis, and Lawrie Brown,
Cultural and Social Aspects of Security and Privacy
- The Critical Elements of Trusted Online Service, presented at
HCI International 2007,
Beijing, China, 22-17 July 2007;
and published in N. Aykin (Ed.):
Usability and Internationalization, Part II, HCII 2007,
Lecture Notes in Computer Science Vol. 4560,
pp 546-553, Springer-Verlag Berlin Heidelberg 2007.
- Yinan Yang, Lawrie Brown, Ed Lewis and Jan Newmarch,
W3 Trust-Profiling Framework (W3TF) to Assess
Trust and Transitivity of Trust of Web-based Services in
a Heterogeneous Web Environment, presented at
APWEB 2006 -
The Eighth Asia Pacific Web Conference, 16-18 Jan 2006, Harbin, China;
and published in
APWeb 2006, X. Zhou et al. (eds),
Springer-Verlag, Lecture Notes in Computer Science Vol 3841, pp 367-378,
© Springer-Verlag Berlin 2006.
- L. Brown,
A New Runtime for the EC Erlang Compiler,
Proceedings AUUG'03, pp171-182, AUUG, Sydney, Sept 2003.
- Y. Yang, L. Brown, J. Newmarch, and E. Lewis,
W3 Trust Model: a Way to Evaluate Trust and
Transitivity of Trust of Online Services,
Internet Computing Conference, Las Vegas, June 2002.
- Y. Yang, L. Brown, J. Newmarch, and E. Lewis,
eCommerce Trust via the Proposed W3 Trust Model,
PACCS01 research student conference, UNSW@ADFA, July 2001.
- L. Brown, "
Custom Safety Policies in Safe Erlang, in
Information Security and Privacy - ACISP2000,
Lecture Notes in Computer Science, vol 1841, pp 30-40, E Dawson, A Clark, C Boyd (eds),
Springer-Verlag, Jun 2000.
- L. Brown, D. Sahlin, "Extending Erlang for Safe
Mobile Code Execution", in Information and Communication Security,
Lecture Notes in Computer Science,
vol 1726, pp 39-53, Vijay Varadharajan, Yi Mu (eds),
Springer-Verlag, Nov 1999.
- Y. Yang, L. Brown, J. Newmarch, E. Lewis, "
Trust MetaData: Enabling Trust and a Counterweight to Risks of E-Commerce",
Asia-Pacific Web Conference, Hong Kong, Sept 1999.
- L. Brown, "
Erlang - An Open Source Language for Robust Distributed Applications",
Proceedings AUUG'99, pp203-210, Melbourne, Sept 1999.
- Y. Yang, L. Brown, J. Newmarch, and E. Lewis,
"A Trusted W3 Model:
Transitivity of Trust in a Heterogeneous Web Environment",
AusWeb'99, pp 59-73, R Debreceny, A Ellis (eds), Ballina, NSW, Apr 1999.
- L. Brown, "
A Current Perspective on Encryption Algorithms",
presented at the UniforumNZ'99 conference in NZ, April 1999.
This has been revised from the version presented to AUUG98 below.
- Y. Yang, L. Brown, J. Newmarch, "
Which One is for You: Issues of Trust in Digital Signature Certificates",
presented at the UniforumNZ'99 conference in NZ, April 1999.
- L. Brown, "
A Current Perspective on Encryption Algorithms",
presented at the AUUG98 Conference, Sydney, Sept 1998.
This has been substantially revised from the version originally
written for the AUUG (Canberra) Summer 98 Conference (below).
- Y. Yang, L. Brown, J. Newmarch, "
Which One is for You: Issues of Trust in Digital Signature Certificates",
presented at the AUUG98 Conference, Sydney, Sept 1998.
- L. Brown, J. Pieprzyk,
"Introducing the new LOKI97 Block Cipher",
Technical Report, No CS02/98, Jun 1998.
Part of the LOKI97 submission package
to the US NIST AES call.
- L. Brown, "
A Current Perspective on Encryption Algorithms",
presented at the AUUG (Canberra) Summer Conference, Feb 1998.
- L. Brown, "SSErl - Prototype of a Safer Erlang",
Technical Report, No CS04/97, Nov 1997.
- L. Brown, D. Sahlin, "Extending Erlang for Safe Mobile
Code Execution", Technical Report CS03/97, Nov 1997.
- L. Brown, D. Sahlin, "Towards an Even Safer Erlang", 3rd
Intl. Erlang User Conference, Kista Sweden, Aug 1997.
- Omid Mohammadi, Warren Toomey, Lawrie Brown,
"Implementing the New DUAL Link Layer in FreeBSD",
Sep 1996. A variant of TR CS1/95 presented to AUUG96 in Melbourne, Sept 1996.
- L. Brown, "Mobile Code Security",
AUUG96, Melbourne, Sept 1996.
Also published as Technical Report CS07/96, Aug 1996.
- Omid Mohammadi, Warren Toomey, Lawrie Brown,
" DUAL - A Packet Format
for a New Amateur Radio Link Layer", Technical Report CS1/95, Feb 1995.
A version of this paper was presented to AUUG96 in Melbourne, Sept 1996.
- L. Brown, "Authorisation and Privacy in a Networked World",
AUUG94, Melbourne, Sept 1994.
Also published as Technical Report CS12/94, June 1994.
[txt] [ps.gz].
- Robyn PHILLIPS, Lawrie BROWN, Dennis HART, Ian MACFARLING,
"Kamus: Computer Assisted Morphological
Analysis of Indonesian Transitive Verbs",
Technical Report CS02/94, Jan 1994.
- L. Brown, "MUDs - Serious Research Tool or Just Another Game",
AUUGN, 14(5), pp56-62, Oct 1993.
Also published as Technical Report CS14/93, September 1993.
[txt] [ps.gz].
- L. Brown, "On Implementing Security Extensions to the TCP
Transport Layer", AUUG93, Sydney, Sept 1993.
Technical Report CS8/92, August 1992.
[txt] [ps.gz].
- L. Brown, M G II Jaatun, "Secure File Transfer Over TCP/IP",
IEEE Tencon92 - 1992 IEEE Region 10 International Conference, Melbourne,
pp494-498, 1992.
Also published as Technical Report CS2/92, March 1992.
[txt] [ps.gz].
- L. Brown, M Kwan, J Pieprzyk, J Seberry,
"Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI",
Advances in Cryptology - Asiacrypt'91",
Lecture Notes in Computer Science,
vol 739, pp 36-50, H Imai et al (eds),
Springer-Verlag, 1993.
Also published as Technical Report CS19/91, July 1991.
[txt] [ps.gz].
- L. Brown, J Pieprzyk, R Safavi-Naini, J Seberry, "A Generalised
Testbed for Analysing Block and Stream Ciphers", Technical Report
CS10/91, March 1991.
[txt] [ps.gz].
- L. Brown,
"
Analysis of the DES and the Design of the LOKI Encryption Scheme", PhD
Thesis, Dept. Computer Science, UC UNSW, ADFA, Canberra, Australia, 1991.
- L. Brown, "Secure Remote Login",
AUUG90, Melbourne, pp 309-320, Sept 1990.
Also published as Technical Report CS35/90, Aug 1990.
[txt] [ps.gz].
- L. Brown, "SECLOG - A Secure Remote Login Frontend and Shell",
Australian Unix Users Group Newsletter, Vol 11, No 2, pp 18-26, April 1990.
Also published as Technical Report CS12/90, 18 March 1990.
[txt] [ps.gz].
- L. Brown, "Technical Options for Implementing Pay-TV in Australia",
Australian Telecommunication Research Journal, Vol 24, No 2, pp 1-8, Nov 1990.
Also published as Technical Report CS13/90, March 1990.
[txt] [ps.gz].
- L. Brown, Josef Pieprzyk and Jennifer Seberry,
"LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications",
in Advances in Cryptology - Auscrypt'90,
Lecture Notes in Computer Science,
vol 453, pp229-236, J Seberry, J Pieprzyk (eds), Springer-Verlag, 1990.
Also published as Technical Report CS1/90, 18 Jan 1990.
[txt] [ps.gz].
- L. Brown and J. Seberry, "Key Scheduling in DES Type Cryptosystems,"
and "LOKI - A Cryptographic Primitive for Authentication and Secrecy
Applications,"
in Advances in Cryptology - Auscrypt'90,
Lecture Notes in Computer Science,
vol 453, pp221-228, J Seberry, J Pieprzyk (eds), Springer-Verlag, 1990.
Also published as Technical Report CS25/89, Oct 1989.
[txt] [ps.gz].
- L. Brown, J R Seberry, "On the Design of Permutation Boxes in DES
Type Cryptosystems",
in Advances in Cryptology - Eurocrypt '89,
Lecture Notes in Computer Science,
vol 434, pp 696-705, J.J. Quisquater, J. Vanderwalle (eds),
Springer-Verlag, Berlin, 1990.
Also published as Technical Report CS6/89, May 1989.
[txt] [ps.gz].
- L. Brown, "Coping with the Macintosh nVIR Virus", Technical Report
CS30/88, Dec 1988.
[txt] [ps.gz].
- L. Brown, "Anatomy of a Macintosh nVIR Virus", Technical Report
CS29/88, Dec 1988.
[txt] [ps.gz].
- L. Brown, "Analysis of the DES and Its Implications for the Design
of an Extended DES", Technical Report CS32/88, Dec 1988.
[txt] [ps.gz].
- L. Brown, "A Proposed Design for an Extended DES",
Computer Security in the Age of Information, W. J. Caelli (ed),
North-Holland, pp 9-22, 1989.
Also published as Technical Report CS8/97, Nov 1987.
[txt] [ps.gz].
- L. Brown, "Implementing the RSA Public Key ",
Proceedings of the IEEE Workshop on Secure
Data Communications, Melbourne: Australia, July 1987.
Also published as Technical Report CS6/97 July 1987.
[txt] [ps.gz].
- L. Brown, "Public Key Cryptosystems - A Bibliography",
Technical Report CS6/87, July 1987.
Dr Lawrie Brown / 1 Feb 2012