The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Agnes Hui Chan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
    The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:92-101 [Conf]
  2. Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
    Mis-representation of Identities in E-cash Schemes and how to Prevent it. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:276-285 [Conf]
  3. Duncan S. Wong, Agnes Hui Chan
    Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:272-289 [Conf]
  4. Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
    Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:540-548 [Conf]
  5. Agnes Hui Chan, Richard A. Games
    On the Linear Span of binary Sequences Obtained from Finite Geometries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:405-417 [Conf]
  6. Agnes Hui Chan, Richard A. Games
    On the Quadratic Spans of Periodic Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:82-89 [Conf]
  7. Muxiang Zhang, Agnes Hui Chan
    Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:501-514 [Conf]
  8. Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
    Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:561-575 [Conf]
  9. Agnes Hui Chan, Mark Goresky, Andrew Klapper
    On the Linear Complexity of Feedback Registers (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:563-570 [Conf]
  10. Agnes Hui Chan, Mark Goresky, Andrew Klapper
    Correlation Functions of Geometric Sequences. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:214-221 [Conf]
  11. Agnes Hui Chan, Richard A. Games, Joseph J. Rushanan
    On Quadratic M-Sequences. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:166-173 [Conf]
  12. Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
    The Software-Oriented Stream Cipher SSC2. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:31-48 [Conf]
  13. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:827-834 [Conf]
  14. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:375-387 [Conf]
  15. Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
    Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:150-161 [Conf]
  16. Agnes Hui Chan
    Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    LCN, 1997, pp:- [Conf]
  17. Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
    Analysis of IS-95 CDMA Voice Privacy. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:1-13 [Conf]
  18. Andrew Klapper, Agnes Hui Chan, Mark Goresky
    Cross-Correlations of Linearly and Quadratically Related Geometric Sequences and GMW Sequences. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1993, v:46, n:1, pp:1-20 [Journal]
  19. Agnes Hui Chan
    Characterization of "Linegraph of an Affine Space". [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1979, v:26, n:1, pp:48-64 [Journal]
  20. Agnes Hui Chan, Richard A. Games, Edwin L. Key
    On the Complexities of de Bruijn Sequences. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1982, v:33, n:3, pp:233-246 [Journal]
  21. Agnes Hui Chan, Dwijendra K. Ray-Chaudhuri
    Embedding of a Pseudo-residual Design into a Möbius Plane. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1982, v:32, n:1, pp:73-98 [Journal]
  22. Agnes Hui Chan
    Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:2, pp:212-214 [Journal]
  23. Agnes Hui Chan, Richard A. Games
    (n, k, t)-covering systems and error-trapping decoding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1981, v:27, n:5, pp:643-0 [Journal]
  24. Agnes Hui Chan, Richard A. Games
    On the linear span of binary sequences obtained from q-ary m-sequences, q odd. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:548-552 [Journal]
  25. Agnes Hui Chan, Richard A. Games
    On the quadratic spans of DeBruijn sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:4, pp:822-829 [Journal]
  26. Agnes Hui Chan, Mark Goresky, Andrew Klapper
    On the linear complexity of feedback registers. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:640-0 [Journal]
  27. Richard A. Games, Agnes Hui Chan
    A fast algorithm for determining the complexity of a binary sequence with period 2n. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1983, v:29, n:1, pp:144-0 [Journal]
  28. Andrew Klapper, Agnes Hui Chan, Mark Goresky
    Cascaded GMW sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:177-183 [Journal]
  29. Agnes Hui Chan
    Embedding of a pseudo-point residual design into a Möbius plane. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1981, v:37, n:1, pp:29-33 [Journal]

  30. Approximation Algorithms for Key Management in Secure Multicast. [Citation Graph (, )][DBLP]


  31. Approximation Algorithms for Key Management in Secure Multicast [Citation Graph (, )][DBLP]


Search in 0.183secs, Finished in 0.184secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002