Dr Douglas Stebila
This person does not currently hold a position at QUT.
Personal details
Keywords
Cryptography, Key exchange, Digital signatures, Public key encryption, Client puzzles, Elliptic curve cryptography, Quantum cryptography, Network security protocols, Secure Sockets Layer (SSL), Internet security
Research field
Data Format, Computer Software, Other Mathematical Sciences
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- PhD in Combinatorics & Optimization (University of Waterloo)
Professional memberships and associations
My PGP/GPG public key has key ID 0x35A2F17C7C8B45E2 and fingerprint 2ADA 9B8D A02C 2977 D998 FFAA 35A2 F17C 7C8B 45E2.
Teaching
- CAB240 Information Security (Semester 2, 2015)
- MXB251 Number Theory and Abstract Algebra (Semester 2, 2015)
- MXB102 Abstract Mathematical Reasoning (Semester 1, 2015)
- INX271 The Web (Semester 1, 2014)
- MXB102 Abstract Mathematical Reasoning (Semester 1, 2014)
- MAB461 Discrete Mathematics (Semester 2, 2013)
- INX355 Cryptology & Protocols (Semester 2, 2013)
- INN651 Security Technologies (Semester 2, 2013)
- MAB122/127 Linear Algebra and Multi-variable Calculus (Semester 1, 2013)
- INN651 Security Technologies (Semester 2, 2012)
- MAB461 Discrete Mathematics (Semester 2, 2012)
- MAB122/127 Algebra and Analytic Geometry (Semester 1, 2012)
- MAN778 Applications of Discrete Mathematics (Semester 1, 2012)
- INN651 Security Technologies (Semester 2, 2011)
- MAB122/127 Algebra and Analytic Geometry (Semester 1, 2011)
- MAN778 Applications of Discrete Mathematics (Semester 1, 2011)
Publications
- Bergsma, F., Dowling, B., Kohlar, F., Schwenk, J. & Stebila, D. (2014). Multi-ciphersuite security of the Secure Shell (SSH) protocol. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 369–381. https://eprints.qut.edu.au/78683
- Poettering, B. & Stebila, D. (2014). Double-authentication-preventing signatures. Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], 436–453. https://eprints.qut.edu.au/73005
- Alawatugoda, J., Stebila, D. & Boyd, C. (2014). Modelling after-the-fact leakage for key exchange. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 207–216. https://eprints.qut.edu.au/68332
- Alawatugoda, J., Boyd, C. & Stebila, D. (2014). Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], 258–273. https://eprints.qut.edu.au/70850
- Goldberg, I., Stebila, D. & Ustaoglu, B. (2013). Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), 245–269. https://eprints.qut.edu.au/48245
- Giesen, F., Kohlar, F. & Stebila, D. (2013). On the security of TLS renegotiation. Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 387–398. https://eprints.qut.edu.au/62025
- Broadbent, A., Gutoski, G. & Stebila, D. (2013). Quantum one-time programs. Advances in Cryptology : 33rd Annual Cryptology Conference, CRYPTO 2013, Proceedings, Part II [Lecture Notes in Computer Science, Vol 8043], 344–360. https://eprints.qut.edu.au/62024
- Suriadi, S., Stebila, D., Clark, A. & Liu, H. (2011). Defending web services against denial of service attacks using client puzzles. Proceedings of 2011 IEEE 9th International Conference on Web Services, 25–32. https://eprints.qut.edu.au/43667
- Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C. & Gonzalez Nieto, J. (2011). Stronger difficulty notions for client puzzles and denial-of-service resistant protocols. Topics in Cryptology - CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, Proceedings [Lecture Notes in Computer Science, Vol 6558], 284–301. https://eprints.qut.edu.au/40036
- Gupta, V., Stebila, D., Fung, S., Chang Shantz, S., Gura, N. & Eberle, H. (2004). Speeding up secure web transactions using elliptic curve cryptography. Proceedings of the 11th Network and Distributed System Security Symposium, 2004, 1–9.
QUT ePrints
For more publications by Douglas, explore their research in QUT ePrints (our digital repository).
Awards
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2015
- Details
- Program committee co-chair for ACISP 2015: Australasian Conference on Information Security and Privacy
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2015
- Details
- Program committee member for Eurocrypt 2015
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2014
- Details
- ACM Conference on Computer and Communications Security (CCS) 2014 Best Student Paper award for the paper "Multi-ciphersuite security of the Secure Shell (SSH) protocol". Conference acceptance rate 20%. Top-ranked cryptography/security conference according to Google Scholar.
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for LATINCRYPT 2014
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for USEC 2014: Workshop on Usable Security
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for ACISP 2014: Australasian Conference on Information Security and Privacy
- Type
- Keynote Speaker/Expert Panel Member/Invited Speaker for a Conference
- Reference year
- 2014
- Details
- Invited speaker for Real World Cryptography Workshop 2014, New York, USA
- Type
- Keynote Speaker/Expert Panel Member/Invited Speaker for a Conference
- Reference year
- 2013
- Details
- Invited speaker for 12th Annual AusCERT Information Security Conference, Gold Coast, Australia.
- Type
- Other
- Reference year
- 2013
- Details
- Program committee member for NSERC (Natural Sciences and Engineering Research Council of Canada) CREATE Training Program in Building a Workforce for the Cryptographic Infrastructure of the 21st Century (CryptoWorks21)
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2011
- Details
- IEEE International Conference on Web Services (ICWS) 2011 Best Paper Award for paper "Defending web services against denial of service using client puzzles". Conference acceptance rate 14%.
Selected research projects
- Title
- Internet authentication protocols: theory and practice
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- DP130104304
- Start year
- 2013
- Keywords
- information security; cryptographic protocols
Projects listed above are funded by Australian Competitive Grants. Projects funded from other sources are not listed due to confidentiality agreements.