The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James Hughes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Hughes
    A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:176-189 [Conf]
  2. Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland
    Factoring Estimates for a 1024-Bit RSA Modulus. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:55-74 [Conf]
  3. Craig Partridge, James Hughes, Jonathan Stone
    Performance of Checksums and CRCs over Real Data. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:68-76 [Conf]
  4. Axelle Apvrille, James Hughes, Vincent Girier
    Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:53-64 [Conf]
  5. James Hughes, Allen Tannenbaum
    Length-Based Attacks for Certain Group Based Encryption Rewriting Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  6. Jonathan Stone, Michael Greenwald, Craig Partridge, James Hughes
    Performance of checksums and CRC's over real data. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1998, v:6, n:5, pp:529-543 [Journal]

  7. Characterization Framework and Design Patterns for the Disadvantaged User. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002