| 2009 | 
|---|
| 10 | EE | Ratna Dutta,
Tom Dowling:
Secure and Efficient Group Key Agreements for Cluster Based Networks.
Transactions on Computational Science 4: 87-116 (2009) | 
| 2007 | 
|---|
| 9 | EE | Andrew Burnett,
Tom Dowling:
A Framework for the Development and Testing of Cryptographic Software.
SCSS (1) 2007: 45-50 | 
| 2004 | 
|---|
| 8 |  | Adam Duffy,
Tom Dowling:
A Java API for Experimental analysis of algorithms.
IASTED Conf. on Software Engineering 2004: 257-262 | 
| 7 |  | Adam Duffy,
Tom Dowling:
An object oriented approach to an identity based encryption cryptosystem.
IASTED Conf. on Software Engineering and Applications 2004: 77-83 | 
| 6 |  | Andrew Burnett,
Tom Dowling:
Rapid prototyping and performance analysis of elliptic curve cryptographic algorithms using Java and Maple.
IASTED Conf. on Software Engineering and Applications 2004: 84-89 | 
| 5 | EE | Louise Owens,
Adam Duffy,
Tom Dowling:
An Identity Based Encryption system.
PPPJ 2004: 154-159 | 
| 2003 | 
|---|
| 4 | EE | Claire Whelan,
Adam Duffy,
Andrew Burnett,
Tom Dowling:
A Java API for polynomial arithmetic.
PPPJ 2003: 139-144 | 
| 3 | EE | John Loughran,
Tom Dowling:
A Java implemented key collision attack on the data encryption standard (DES).
PPPJ 2003: 155-157 | 
| 2 | EE | David Gildea,
Tom Dowling:
A Java OpenCard framework based medical smartcard system.
PPPJ 2003: 99-103 | 
| 2002 | 
|---|
| 1 | EE | Andrew Burnett,
Keith Winters,
Tom Dowling:
A Java implementation of an elliptic curve cryptosystem.
PPPJ/IRE 2002: 83-88 |