1 – 8 of 8
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
The security implications of quantum cryptography and quantum computing
(
- Contribution to journal › Article
- 2019
-
Mark
Key technology choices for optimal massive IoT devices
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 2010
-
Mark
Secure implementation and utilization of device-specific security data
2010) 7861097(
- Patent › Patent
- 2009
-
Mark
Loading data into a mobile terminal
2009) 7558953(
- Patent › Patent
- 2000
-
Mark
Bluetooth security - An overview
(
- Contribution to journal › Debate/Note/Editorial
- 1997
-
Mark
Fast authentication codes based on random polynomial residue classes
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
Bounds on the probability of deception in multiple authentication
(
- Contribution to journal › Article
- 1992
-
Mark
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound
(
- Contribution to journal › Article