Search the dblp DataBase
Michael Roe :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tuomas Aura , Michael Roe , Jari Arkko Security of Internet Location Management. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:78-90 [Conf ] Ross J. Anderson , Michael Roe The GCHQ Protocol and Its Problems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:134-148 [Conf ] Michael Roe Performance of Block Ciphers and Hash Functions - One Year Later. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:359-362 [Conf ] Michael Roe Performance of Symmetric Ciphers and One-Way Hash Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:83-89 [Conf ] Michael Roe How to Reverse Engineer an EES Device. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:305-328 [Conf ] Hajime Morito , Michael Roe , E. Stewart Lee Digital Copy Protection Scheme Using Recording Medium Identifier. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:174-178 [Conf ] Bruce Christianson , Michael Roe , David Wheeler Secure Sessions from Weak Secrets. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:190-205 [Conf ] Michael Roe Authentication and Naming (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:20-23 [Conf ] Michael Roe Experiences of Mobile IP Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:4-11 [Conf ] Michael Roe Panel Session: Is Protocol Modelling Finished? [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:213-217 [Conf ] Michael Roe Certification and Delegation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:168-176 [Conf ] Michael Roe Performance of Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:140-152 [Conf ] Michael Roe , Ross J. Anderson , William S. Harbison , T. Mark A. Lomas Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:62-73 [Conf ] Tuomas Aura , Michael Roe Designing the mobile IPv6 security protocol. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:332-356 [Journal ] Greg O'Shea , Michael Roe Child-proof authentication for MIPv6 (CAM). [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2001, v:31, n:2, pp:4-8 [Journal ] Chattering Laptops. [Citation Graph (, )][DBLP ] Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP ] Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP ] Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP ] Scanning electronic documents for personally identifiable information. [Citation Graph (, )][DBLP ] Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP ] Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs