The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Maciej Nikodem: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marcin Gomulkiewicz, Maciej Nikodem, Tadeusz Tomczak
    Low-cost and Universal Secure Scan: a Design- Architecture for Crypto Chips. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:282-288 [Conf]
  2. Manuel Berenguel, Cristina Cirre, Ryszard Klempous, Henryk Maciejewski, Maciej Nikodem, Jan Nikodem, Imre J. Rudas, Loreto Valenzuela
    Hierarchical Control of a Distributed Solar Collector Field. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2005, pp:614-620 [Conf]
  3. Manuel Berenguel, Ryszard Klempous, Henryk Maciejewski, Jan Nikodem, Maciej Nikodem, Loreto Valenzuela
    Explanatory Analysis of Data from a Distributed Solar Collector Field. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2005, pp:621-626 [Conf]
  4. Janusz Biernat, Maciej Nikodem
    Fault Cryptanalysis of ElGamal Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2005, pp:327-336 [Conf]
  5. Maciej Nikodem
    Error Prevention, Detection and Diffusion Algorithms for Cryptographic Hardware. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2007, pp:127-134 [Conf]
  6. Jan Nikodem, Maciej Nikodem
    Secure and Scalable Communication in Vehicle Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2007, pp:1167-1174 [Conf]

  7. DSA Signature Scheme Immune to the Fault Cryptanalysis. [Citation Graph (, )][DBLP]


  8. Boolean logic function synthesis for generalised threshold gate circuits. [Citation Graph (, )][DBLP]


  9. ElGamal Signature Scheme Immune to Fault Analysis. [Citation Graph (, )][DBLP]


  10. Secure Communication Trees in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  11. Boundary Scan Security Enhancements for a Cryptographic Hardware. [Citation Graph (, )][DBLP]


  12. Securing Communication Trees in Ad Hoc Sensor Networks with Polynomial-Based Key Pre-Distribution. [Citation Graph (, )][DBLP]


  13. Error detection and error correction procedures for the advanced encryption standard. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002