The SCEAS System
Navigation Menu

Search the dblp DataBase


Michael Willett: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bob Thibadeau, Michael Willett
    Trusted Storage: Focus on Use Cases. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:515-521 [Conf]
  2. Michael Willett
    The IBM Token-Ring Network: A Functional Perspective. [Citation Graph (0, 0)][DBLP]
    FJCC, 1986, pp:489-497 [Conf]
  3. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  4. Michael Smith, Paul C. van Oorschot, Michael Willett
    Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal]
  5. Michael Willett
    Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:28-30 [Journal]
  6. Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
    Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
  7. Michael Willett
    Trapdoor Knapsacks Without Superincreasing Structure. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1983, v:17, n:1, pp:7-11 [Journal]

  8. Trusted Storage: Putting Security and Data Together. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002