|
Search the dblp DataBase
Daniel V. Bailey:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Adam D. Woodbury, Daniel V. Bailey, Christof Paar
Elliptic Curve Cryptography on Smart Cards without Coprocessors. [Citation Graph (0, 0)][DBLP] CARDIS, 2000, pp:71-92 [Conf]
- Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury
NTRU in Constrained Devices. [Citation Graph (0, 0)][DBLP] CHES, 2001, pp:262-272 [Conf]
- Daniel V. Bailey, Christof Paar
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:472-485 [Conf]
- Ari Juels, Paul F. Syverson, Daniel V. Bailey
High-Power Proxies for Enhancing RFID Privacy and Utility. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2005, pp:210-226 [Conf]
- Daniel V. Bailey, Ari Juels
Shoehorning Security into the EPC Tag Standard. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:303-320 [Conf]
- Daniel V. Bailey, Christof Paar
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:3, pp:153-176 [Journal]
Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]
Vulnerabilities in First-Generation RFID-enabled Credit Cards. [Citation Graph (, )][DBLP]
One-touch Financial Transaction Authentication. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|