1 – 7 of 7
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2012
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2000
-
Mark
A simple algorithm for fast correlation attacks on stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
On key and message equivocations in secrecy systems
(
- Contribution to journal › Article
- 1996
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
(
- Contribution to journal › Article
- 1995
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1993
-
Mark
On the relation between A-codes and codes correcting independent errors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of universal families of hash functions via geometric codes and concatenation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding