The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Roe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tuomas Aura, Michael Roe, Jari Arkko
    Security of Internet Location Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:78-90 [Conf]
  2. Ross J. Anderson, Michael Roe
    The GCHQ Protocol and Its Problems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:134-148 [Conf]
  3. Michael Roe
    Performance of Block Ciphers and Hash Functions - One Year Later. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:359-362 [Conf]
  4. Michael Roe
    Performance of Symmetric Ciphers and One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:83-89 [Conf]
  5. Michael Roe
    How to Reverse Engineer an EES Device. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:305-328 [Conf]
  6. Hajime Morito, Michael Roe, E. Stewart Lee
    Digital Copy Protection Scheme Using Recording Medium Identifier. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:174-178 [Conf]
  7. Bruce Christianson, Michael Roe, David Wheeler
    Secure Sessions from Weak Secrets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:190-205 [Conf]
  8. Michael Roe
    Authentication and Naming (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:20-23 [Conf]
  9. Michael Roe
    Experiences of Mobile IP Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:4-11 [Conf]
  10. Michael Roe
    Panel Session: Is Protocol Modelling Finished? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:213-217 [Conf]
  11. Michael Roe
    Certification and Delegation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:168-176 [Conf]
  12. Michael Roe
    Performance of Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:140-152 [Conf]
  13. Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas
    Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:62-73 [Conf]
  14. Tuomas Aura, Michael Roe
    Designing the mobile IPv6 security protocol. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:332-356 [Journal]
  15. Greg O'Shea, Michael Roe
    Child-proof authentication for MIPv6 (CAM). [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2001, v:31, n:2, pp:4-8 [Journal]

  16. Chattering Laptops. [Citation Graph (, )][DBLP]


  17. Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP]


  18. Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP]


  19. Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP]


  20. Scanning electronic documents for personally identifiable information. [Citation Graph (, )][DBLP]


  21. Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]


  22. Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002