|
Search the dblp DataBase
Michael Willett:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bob Thibadeau, Michael Willett
Trusted Storage: Focus on Use Cases. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:515-521 [Conf]
- Michael Willett
The IBM Token-Ring Network: A Functional Perspective. [Citation Graph (0, 0)][DBLP] FJCC, 1986, pp:489-497 [Conf]
- Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
- Michael Smith, Paul C. van Oorschot, Michael Willett
Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal]
- Michael Willett
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:28-30 [Journal]
- Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
- Michael Willett
Trapdoor Knapsacks Without Superincreasing Structure. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1983, v:17, n:1, pp:7-11 [Journal]
Trusted Storage: Putting Security and Data Together. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|