2009 |
10 | EE | Ratna Dutta,
Tom Dowling:
Secure and Efficient Group Key Agreements for Cluster Based Networks.
Transactions on Computational Science 4: 87-116 (2009) |
2007 |
9 | EE | Andrew Burnett,
Tom Dowling:
A Framework for the Development and Testing of Cryptographic Software.
SCSS (1) 2007: 45-50 |
2004 |
8 | | Adam Duffy,
Tom Dowling:
A Java API for Experimental analysis of algorithms.
IASTED Conf. on Software Engineering 2004: 257-262 |
7 | | Adam Duffy,
Tom Dowling:
An object oriented approach to an identity based encryption cryptosystem.
IASTED Conf. on Software Engineering and Applications 2004: 77-83 |
6 | | Andrew Burnett,
Tom Dowling:
Rapid prototyping and performance analysis of elliptic curve cryptographic algorithms using Java and Maple.
IASTED Conf. on Software Engineering and Applications 2004: 84-89 |
5 | EE | Louise Owens,
Adam Duffy,
Tom Dowling:
An Identity Based Encryption system.
PPPJ 2004: 154-159 |
2003 |
4 | EE | Claire Whelan,
Adam Duffy,
Andrew Burnett,
Tom Dowling:
A Java API for polynomial arithmetic.
PPPJ 2003: 139-144 |
3 | EE | John Loughran,
Tom Dowling:
A Java implemented key collision attack on the data encryption standard (DES).
PPPJ 2003: 155-157 |
2 | EE | David Gildea,
Tom Dowling:
A Java OpenCard framework based medical smartcard system.
PPPJ 2003: 99-103 |
2002 |
1 | EE | Andrew Burnett,
Keith Winters,
Tom Dowling:
A Java implementation of an elliptic curve cryptosystem.
PPPJ/IRE 2002: 83-88 |