|
Search the dblp DataBase
Thomas S. Messerges:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Thomas S. Messerges
Using Second-Order Power Analysis to Attack DPA Resistant Software. [Citation Graph (0, 0)][DBLP] CHES, 2000, pp:238-251 [Conf]
- Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan
Power Analysis Attacks of Modular Exponentiation in Smartcards. [Citation Graph (0, 0)][DBLP] CHES, 1999, pp:144-157 [Conf]
- David W. Kravitz, Thomas S. Messerges
Achieving media portability through local content translation and end-to-end rights management. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:27-36 [Conf]
- Thomas S. Messerges, Ezzat A. Dabbish
Digital rights management in a 3G mobile phone and beyond. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2003, pp:27-38 [Conf]
- Thomas S. Messerges
Securing the AES Finalists Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:150-164 [Conf]
- Thomas S. Messerges, Johnas Cukier, Tom A. M. Kevenaar, Larry Puhl, René Struik, Ed Callaway
A security design for a general purpose, self-organizing, multihop ad hoc wireless network. [Citation Graph (0, 0)][DBLP] SASN, 2003, pp:1-11 [Conf]
- Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan
Examining Smart-Card Security under the Threat of Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2002, v:51, n:5, pp:541-552 [Journal]
Resolving the Micropayment Problem. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|