Paul Montague
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j2]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Industrial Informatics 14(7): 3289-3297 (2018) - [c9]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. GameSec 2018: 145-165 - [i1]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. CoRR abs/1808.05770 (2018) - 2017
- [c8]Paul Montague, Junae Kim:
An efficient semi-supervised SVM for anomaly detection. IJCNN 2017: 2843-2850 - 2012
- [c7]
2000 – 2009
- 2005
- [c6]Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague:
GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405 - [c5]
- [e3]Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn:
ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 44, Australian Computer Society 2005, ISBN 1-920682-26-0 [contents] - 2004
- [j1]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004) - [e2]James M. Hogan, Paul Montague, Martin K. Purvis, Chris Steketee:
ACSW Frontiers 2004, 2004 ACSW Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation (AWSI2004) . Dunedin, New Zealand, January 2004. CRPIT 32, Australian Computer Society 2004, ISBN 1-920682-14-7 [contents] - 2003
- [c4]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66 - [c3]Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:
A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 - [e1]Chris W. Johnson, Paul Montague, Chris Steketee:
ACSW Frontiers 2003, 2003 ACSW Workshops - the Australasian Information Security Workshop (AISW) and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003. CRPIT 21, Australian Computer Society 2003, ISBN 1-920682-00-7 [contents] - 2002
- [c2]Yvonne Hitchcock, Paul Montague:
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. ACISP 2002: 214-225 - 2001
- [c1]Colin Boyd, Paul Montague, Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols. ACISP 2001: 487-501
Coauthor Index
last updated on 2018-11-03 19:54 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint