DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Roger Needham
Roger Needham
Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
Roger Needham
An Interview with Tony Hoare ACM 1980 A.M. Turing Award Recipient
Obituary Karen Spärck Jones
2017 USENIX Vail Computer Elements Workshop
Original File Was Jvis Final.Tex
Professor Sir Tony Hoare Interviewed by Dr
A Security Policy Model for Clinical Information Systems
A Secure and Efficient Lightweight Symmetric Encryption Scheme For
Information Technology 1 and 2
CS 261 Scribe Notes Crypto Protocols
Your Magazine from the British Ecological Society
A Logic of Authentication
April in Paris: European Software Focus - Microsoft Research
English for It-Students Part Ii
An Image Based Authentication System- Using Needham Schroeder Protocol
Monographs in Computer Science
The Challenge of Being an Engineer – Reflections from a Security Engineer
Top View
A Crypt Analysis of the Tiny Encryption Algorithm in Key Generation
Professor Roger Needham (1935–2003)
CS555 Syllabus—Spring 2000
Reminiscences on the 25Th SOSP's History Day Workshop
Flexisec: a Configurable Link Layer Security Architecture for Wireless Sensor Networks
Prudent Engineering Practice for Cryptographic Protocols
Computer Systems Theory, Technology, and Applications
Natural Language Processing and Information Retrieval
Roger Needham, 1935–2003
The Tiny Encryption Algorithm
Roger Needham : an Informal Memoir
Programming Satan's Computer
The Tiny Encryption Algorithm (TEA) One of the Most Secure Cipher Algorithms Ever Devised