Search the dblp DataBase
Mike Bond :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mike Bond , Jolyon Clulow Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:140-151 [Conf ] Mike Bond Attacks on Cryptoprocessor Transaction Sets. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:220-234 [Conf ] Richard Clayton , Mike Bond Experience Using a Low-Cost FPGA Design to Crack DES Keys. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:579-592 [Conf ] Mike Bond , Ross J. Anderson API-Level Attacks on Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:10, pp:67-75 [Journal ] Mike Bond , Jolyon Clulow Extending Security Protocol Analysis: New Challenges. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:13-24 [Journal ] Mike Bond , George Danezis A pact with the devil. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:77-82 [Conf ] Leaving Room for the Bad Guys. [Citation Graph (, )][DBLP ] Virtual Economies: Threats and Risks. [Citation Graph (, )][DBLP ] Chip and PIN is Broken. [Citation Graph (, )][DBLP ] The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP ] The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP ] Phish and Chips. [Citation Graph (, )][DBLP ] The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP ] Phish and Chips. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs