Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lauren May is active.

Publication


Featured researches published by Lauren May.


australasian conference on information security and privacy | 2002

Strengthening the Key Schedule of the AES

Lauren May; Matthew Henricksen; William Millan; Gary Carter; Ed Dawson

In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.


australasian conference on information security and privacy | 2000

An Implementation of Bitsliced DES on the Pentium MMXTM Processor

Lauren May; Lyta Penna; Andrew J. Clark

In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are discussed and comparisons made with an optimised C-coded DES implementation and an assembly language DES implementation. This paper sets the scene for future research of the inter-relation between design and implementation of the newer 128-bit symmetric block ciphers.


QUT Business School; Faculty of Science and Technology; Information Security Institute | 2008

E-government security in developing countries :a managerial conceptual framework

Salahuddin Alfawaz; Lauren May; Kavoos Mohannak


Faculty of Science and Technology; Information Security Institute | 2010

A secure architecture for Australia’s index based e-health environment

Vicky Liu; William J. Caelli; Jason Smith; Lauren May; Min Hui Lee; Zi Hao Ng; Jin Hong Foo; Weihao Li


Cryptographic Algorithms and their Uses | 2004

CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique

Praveen Gauravaram; Lauren May; William Millan


Journal of Theoretical and Applied Electronic Commerce Research | 2006

A model for improving e-security in Australian universities

Lauren May; Tim Lane


HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80 | 2008

Open trusted health informatics structure (OTHIS)

Vicky Liu; William J. Caelli; Lauren May; Peter R. Croll


Electronic Journal of Health Informatics | 2008

Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis

Vicky Liu; Lauren May; William J. Caelli; Peter R. Croll


Archive | 2007

A Sustainable Approach to Security and Privacy in Health Information Systems

Vicky Liu; Lauren May; William J. Caelli; Peter R. Croll


Medinfo 2007: Proceedings of the 12th World Congress on Health (Medical) Informatics; Building Sustainable Health Systems | 2007

Current Approaches to Secure Health Information Systems are not Sustainable: An Analysis

Vicky Liu; William J. Caelli; Lauren May; Peter R. Croll; Matthew Henricksen

Collaboration


Dive into the Lauren May's collaboration.

Top Co-Authors

Avatar

Vicky Liu

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

William J. Caelli

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Peter R. Croll

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark T. Carey-Smith

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Tim Lane

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark Burdon

University of Queensland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jason Smith

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jin Hong Foo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Karen J. Nelson

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge