From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rekeying Issues in the MUGI Stream Cipher., и . Selected Areas in Cryptography, том 3897 из Lecture Notes in Computer Science, стр. 175-188. Springer, (2005)Securing Grid Data Using Mandatory Access Controls., , и . ACSW, том 68 из CRPIT, стр. 25-32. Australian Computer Society, (2007)Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records., , , и . MedInfo, том 129 из Studies in Health Technology and Informatics, стр. 498-502. IOS Press, (2007)Dragon: A Fast Word Based Stream Cipher., , , , , , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 33-50. Springer, (2004)An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , и . Cryptographic Algorithms and their Uses, стр. 110-124. Queensland University of Technology, (2004)Side-Channel Analysis of the K2 Stream Cipher., , , , и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 53-73. Springer, (2010)Strengthening the Key Schedule of the AES., , , , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 226-240. Springer, (2002)Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond., и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 52-63. Springer, (2006)A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher., , , , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 418-431. Springer, (2003)Improved Cryptanalysis of MAG., и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 64-75. Springer, (2006)