Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Batten, Lynn Margaret")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 38

  • Page / 2
Export

Selection :

  • and

Side channel attacks against HMACs based on block-cipher based hash functionsOKEYA, Katsuyuki.Lecture notes in computer science. 2006, pp 432-443, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Statistical decoding revisitedOVERBECK, R.Lecture notes in computer science. 2006, pp 283-294, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)Batten, Lynn Margaret; Safavi-Naini, Reihanah.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35458-1, 1Vol, XII-446 p, isbn 3-540-35458-1Conference Proceedings

Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Algebraic attacks over GF(q)BATTEN, Lynn Margaret.Lecture notes in computer science. 2004, pp 84-91, issn 0302-9743, isbn 3-540-24130-2, 8 p.Conference Paper

More on stand-alone and setup-free verifiably committed signaturesHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 148-158, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Secure cross-realm C2C-PAKE protocolYIN YIN; LI BAO.Lecture notes in computer science. 2006, pp 395-406, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Direct chosen-ciphertext secure identity-based key encapsulation without random oraclesKILTZ, Eike; GALINDO, David.Lecture notes in computer science. 2006, pp 336-347, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyondHENRICKSEN, Matt; DAWSON, Ed.Lecture notes in computer science. 2006, pp 52-63, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

PA in the two-key setting and a generic conversion for encryption with anonymityHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2006, pp 271-282, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

A novel range testKUN PENG; BOYD, Colin; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 247-258, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Adaptively secure traitor tracing against key exposure and its application to anywhere TV serviceOGAWA, Kazuto; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 123-135, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 13 p.Conference Paper

Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacksBRAEKEN, An; LANO, Joseph; PRENEEL, Bart et al.Lecture notes in computer science. 2006, pp 40-51, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Event-oriented k-times revocable-iff-linked group signaturesMAN HO AU; SUSILO, Willy; YIU, Siu-Ming et al.Lecture notes in computer science. 2006, pp 223-234, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Towards an invisible honeypot monitoring systemQUYNH, Nguyen Anh; TAKEFUJI, Yoshiyasu.Lecture notes in computer science. 2006, pp 111-122, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Efficient identity-based signatures secure in the standard modelPATERSON, Kenneth G; SCHULDT, Jacob C. N.Lecture notes in computer science. 2006, pp 207-222, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 16 p.Conference Paper

Graphical representation of authorization policies for weighted credentialsAGUDO, Isaac; LOPEZ, Javier; MONTENEGRO, Jose A et al.Lecture notes in computer science. 2006, pp 383-394, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

On optimizing the k-ward micro-aggregation technique for secure statistical databasesFAYYOUMI, Ebaa; OOMMEN, B. John.Lecture notes in computer science. 2006, pp 324-335, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

An extension to bellare and rogaway (1993) model : Resetting compromised long-term keysBOYD, Colin; RAYMOND CHOO, Kim-Kwang; MATHURIA, Anish et al.Lecture notes in computer science. 2006, pp 371-382, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Constructing secure hash functions by enhancing merkle-damgård constructionGAURAVARAM, Praveen; MILLAN, William; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 407-420, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 14 p.Conference Paper

Fingercasting : Joint fingerprinting and decryption of broadcast messagesADELSBACH, André; HUBER, Ulrich; SADEGHI, Ahmad-Reza et al.Lecture notes in computer science. 2006, pp 136-147, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

  • Page / 2