Search the dblp DataBase
Agnes Hui Chan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Duncan S. Wong , Hector Ho Fuentes , Agnes Hui Chan The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:92-101 [Conf ] Agnes Hui Chan , Yair Frankel , Philip D. MacKenzie , Yiannis Tsiounis Mis-representation of Identities in E-cash Schemes and how to Prevent it. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:276-285 [Conf ] Duncan S. Wong , Agnes Hui Chan Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:272-289 [Conf ] Bob Blakley , G. R. Blakley , Agnes Hui Chan , James L. Massey Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:540-548 [Conf ] Agnes Hui Chan , Richard A. Games On the Linear Span of binary Sequences Obtained from Finite Geometries. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:405-417 [Conf ] Agnes Hui Chan , Richard A. Games On the Quadratic Spans of Periodic Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:82-89 [Conf ] Muxiang Zhang , Agnes Hui Chan Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:501-514 [Conf ] Agnes Hui Chan , Yair Frankel , Yiannis Tsiounis Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:561-575 [Conf ] Agnes Hui Chan , Mark Goresky , Andrew Klapper On the Linear Complexity of Feedback Registers (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:563-570 [Conf ] Agnes Hui Chan , Mark Goresky , Andrew Klapper Correlation Functions of Geometric Sequences. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:214-221 [Conf ] Agnes Hui Chan , Richard A. Games , Joseph J. Rushanan On Quadratic M-Sequences. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:166-173 [Conf ] Muxiang Zhang , Christopher Carroll , Agnes Hui Chan The Software-Oriented Stream Cipher SSC2. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:31-48 [Conf ] Duncan S. Wong , Agnes Hui Chan , Feng Zhu Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:827-834 [Conf ] Duncan S. Wong , Agnes Hui Chan , Feng Zhu More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:375-387 [Conf ] Feng Zhu , Duncan S. Wong , Agnes Hui Chan , Robbie Ye Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:150-161 [Conf ] Agnes Hui Chan Electronic Commerce. [Citation Graph (0, 0)][DBLP ] LCN, 1997, pp:- [Conf ] Muxiang Zhang , Christopher Carroll , Agnes Hui Chan Analysis of IS-95 CDMA Voice Privacy. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:1-13 [Conf ] Andrew Klapper , Agnes Hui Chan , Mark Goresky Cross-Correlations of Linearly and Quadratically Related Geometric Sequences and GMW Sequences. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1993, v:46, n:1, pp:1-20 [Journal ] Agnes Hui Chan Characterization of "Linegraph of an Affine Space". [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1979, v:26, n:1, pp:48-64 [Journal ] Agnes Hui Chan , Richard A. Games , Edwin L. Key On the Complexities of de Bruijn Sequences. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1982, v:33, n:3, pp:233-246 [Journal ] Agnes Hui Chan , Dwijendra K. Ray-Chaudhuri Embedding of a Pseudo-residual Design into a Möbius Plane. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1982, v:32, n:1, pp:73-98 [Journal ] Agnes Hui Chan Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1987, v:36, n:2, pp:212-214 [Journal ] Agnes Hui Chan , Richard A. Games (n, k, t)-covering systems and error-trapping decoding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1981, v:27, n:5, pp:643-0 [Journal ] Agnes Hui Chan , Richard A. Games On the linear span of binary sequences obtained from q-ary m-sequences, q odd. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:548-552 [Journal ] Agnes Hui Chan , Richard A. Games On the quadratic spans of DeBruijn sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:4, pp:822-829 [Journal ] Agnes Hui Chan , Mark Goresky , Andrew Klapper On the linear complexity of feedback registers. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:640-0 [Journal ] Richard A. Games , Agnes Hui Chan A fast algorithm for determining the complexity of a binary sequence with period 2n . [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1983, v:29, n:1, pp:144-0 [Journal ] Andrew Klapper , Agnes Hui Chan , Mark Goresky Cascaded GMW sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:177-183 [Journal ] Agnes Hui Chan Embedding of a pseudo-point residual design into a Möbius plane. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1981, v:37, n:1, pp:29-33 [Journal ] Approximation Algorithms for Key Management in Secure Multicast. [Citation Graph (, )][DBLP ] Approximation Algorithms for Key Management in Secure Multicast [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs