The SCEAS System
| |||||||

## Search the dblp DataBase
Agnes Hui Chan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
**The Performance Measurement of Cryptographic Primitives on Palm Devices.**[Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:92-101 [Conf] - Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
**Mis-representation of Identities in E-cash Schemes and how to Prevent it.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:276-285 [Conf] - Duncan S. Wong, Agnes Hui Chan
**Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:272-289 [Conf] - Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
**Threshold Schemes with Disenrollment.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:540-548 [Conf] - Agnes Hui Chan, Richard A. Games
**On the Linear Span of binary Sequences Obtained from Finite Geometries.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1986, pp:405-417 [Conf] - Agnes Hui Chan, Richard A. Games
**On the Quadratic Spans of Periodic Sequences.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1989, pp:82-89 [Conf] - Muxiang Zhang, Agnes Hui Chan
**Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:501-514 [Conf] - Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
**Easy Come - Easy Go Divisible Cash.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:561-575 [Conf] - Agnes Hui Chan, Mark Goresky, Andrew Klapper
**On the Linear Complexity of Feedback Registers (Extended Abstract).**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:563-570 [Conf] - Agnes Hui Chan, Mark Goresky, Andrew Klapper
**Correlation Functions of Geometric Sequences.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:214-221 [Conf] - Agnes Hui Chan, Richard A. Games, Joseph J. Rushanan
**On Quadratic M-Sequences.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1993, pp:166-173 [Conf] - Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
**The Software-Oriented Stream Cipher SSC2.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:31-48 [Conf] - Duncan S. Wong, Agnes Hui Chan, Feng Zhu
**Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).**[Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:827-834 [Conf] - Duncan S. Wong, Agnes Hui Chan, Feng Zhu
**More Efficient Password Authenticated Key Exchange Based on RSA.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:375-387 [Conf] - Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
**Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.**[Citation Graph (0, 0)][DBLP] ISC, 2002, pp:150-161 [Conf] - Agnes Hui Chan
**Electronic Commerce.**[Citation Graph (0, 0)][DBLP] LCN, 1997, pp:- [Conf] - Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
**Analysis of IS-95 CDMA Voice Privacy.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:1-13 [Conf] - Andrew Klapper, Agnes Hui Chan, Mark Goresky
**Cross-Correlations of Linearly and Quadratically Related Geometric Sequences and GMW Sequences.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 1993, v:46, n:1, pp:1-20 [Journal] - Agnes Hui Chan
**Characterization of "Linegraph of an Affine Space".**[Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1979, v:26, n:1, pp:48-64 [Journal] - Agnes Hui Chan, Richard A. Games, Edwin L. Key
**On the Complexities of de Bruijn Sequences.**[Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1982, v:33, n:3, pp:233-246 [Journal] - Agnes Hui Chan, Dwijendra K. Ray-Chaudhuri
**Embedding of a Pseudo-residual Design into a Möbius Plane.**[Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1982, v:32, n:1, pp:73-98 [Journal] - Agnes Hui Chan
**Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1987, v:36, n:2, pp:212-214 [Journal] - Agnes Hui Chan, Richard A. Games
**(n, k, t)-covering systems and error-trapping decoding.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1981, v:27, n:5, pp:643-0 [Journal] - Agnes Hui Chan, Richard A. Games
**On the linear span of binary sequences obtained from q-ary m-sequences, q odd.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:548-552 [Journal] - Agnes Hui Chan, Richard A. Games
**On the quadratic spans of DeBruijn sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1990, v:36, n:4, pp:822-829 [Journal] - Agnes Hui Chan, Mark Goresky, Andrew Klapper
**On the linear complexity of feedback registers.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:640-0 [Journal] - Richard A. Games, Agnes Hui Chan
**A fast algorithm for determining the complexity of a binary sequence with period 2**[Citation Graph (0, 0)][DBLP]^{n}. IEEE Transactions on Information Theory, 1983, v:29, n:1, pp:144-0 [Journal] - Andrew Klapper, Agnes Hui Chan, Mark Goresky
**Cascaded GMW sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:177-183 [Journal] - Agnes Hui Chan
**Embedding of a pseudo-point residual design into a Möbius plane.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1981, v:37, n:1, pp:29-33 [Journal] **Approximation Algorithms for Key Management in Secure Multicast.**[Citation Graph (, )][DBLP]**Approximation Algorithms for Key Management in Secure Multicast**[Citation Graph (, )][DBLP]
Search in 0.183secs, Finished in 0.184secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |