Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Batten, Lynn Margaret")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 27

  • Page / 2
Export

Selection :

  • and

Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Direct chosen-ciphertext secure identity-based key encapsulation without random oraclesKILTZ, Eike; GALINDO, David.Lecture notes in computer science. 2006, pp 336-347, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyondHENRICKSEN, Matt; DAWSON, Ed.Lecture notes in computer science. 2006, pp 52-63, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

PA in the two-key setting and a generic conversion for encryption with anonymityHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2006, pp 271-282, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Adaptively secure traitor tracing against key exposure and its application to anywhere TV serviceOGAWA, Kazuto; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 123-135, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 13 p.Conference Paper

Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacksBRAEKEN, An; LANO, Joseph; PRENEEL, Bart et al.Lecture notes in computer science. 2006, pp 40-51, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Event-oriented k-times revocable-iff-linked group signaturesMAN HO AU; SUSILO, Willy; YIU, Siu-Ming et al.Lecture notes in computer science. 2006, pp 223-234, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Towards an invisible honeypot monitoring systemQUYNH, Nguyen Anh; TAKEFUJI, Yoshiyasu.Lecture notes in computer science. 2006, pp 111-122, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

An extension to bellare and rogaway (1993) model : Resetting compromised long-term keysBOYD, Colin; RAYMOND CHOO, Kim-Kwang; MATHURIA, Anish et al.Lecture notes in computer science. 2006, pp 371-382, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Constructing secure hash functions by enhancing merkle-damgård constructionGAURAVARAM, Praveen; MILLAN, William; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 407-420, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 14 p.Conference Paper

Fingercasting : Joint fingerprinting and decryption of broadcast messagesADELSBACH, André; HUBER, Ulrich; SADEGHI, Ahmad-Reza et al.Lecture notes in computer science. 2006, pp 136-147, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Hiding circuit topology from unbounded reverse engineersYU YU; LEIWO, Jussipekka; PREMKUMAR, Benjamin et al.Lecture notes in computer science. 2006, pp 171-182, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

On exact algebraic [non-] immunity of S-boxes based on power functionsCOURTOIS, Nicolas T; DEBRAIZE, Blandine; GARRIDO, Eric et al.Lecture notes in computer science. 2006, pp 76-86, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Distinguishing attack on SOBER-128 with linear maskingJOO YEON CHO; PIEPRZYK, Josef.Lecture notes in computer science. 2006, pp 29-39, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Tag-KEM from set partial domain one-way permutationsABE, Masayuki; YANG CUI; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 360-370, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

The role of the self-defending object concept in developing distributed security-aware applicationsHOLFORD, John W; CAELLI, William J.Lecture notes in computer science. 2006, pp 183-194, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Towards provable security for ubiquitous applicationsBURMESTER, Mike; VAN LE, Tri; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2006, pp 295-312, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 18 p.Conference Paper

Augmented certificate revocation listsLAKSHMINARAYANAN, A; LIM, T. L.Lecture notes in computer science. 2006, pp 87-98, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Online/offline signatures and multisignatures for AODV and DSR routing securitySHIDI XU; YI MU; SUSILO, Willy et al.Lecture notes in computer science. 2006, pp 99-110, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Forgery and key recovery attacks on PMAC and mitchell's TMAC variantLEE, Changhoon; KIM, Jongsung; SUNG, Jaechul et al.Lecture notes in computer science. 2006, pp 421-431, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Generic transforms to acquire CCA-security for identity based encryption : The cases of FOPKC and REACTKITAGAWA, Takashi; PENG YANG; HANAOKA, Goichiro et al.Lecture notes in computer science. 2006, pp 348-359, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

  • Page / 2