Royal Holloway, University of London

Results: 250



#Item
191Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
192CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
193e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2008-02-29 12:44:11
194Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
195Securing Peer-to-Peer Networks Using Trusted Computing Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom.

Securing Peer-to-Peer Networks Using Trusted Computing Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-01-31 10:46:54
196Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-06-23 08:33:02
197An attack on some multi-party key agreement protocols Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK

An attack on some multi-party key agreement protocols Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-03 07:14:36
    198An Analysis of DepenDNS Nadhem J. AlFardan and Kenneth G. Paterson? Information Security Group (ISG) Royal Holloway, University of London Egham Hill, Egham, TW20 0EX, UK emails: {nadhem.j.a.alfardan}{kenny.paterson}@rhul

    An Analysis of DepenDNS Nadhem J. AlFardan and Kenneth G. Paterson? Information Security Group (ISG) Royal Holloway, University of London Egham Hill, Egham, TW20 0EX, UK emails: {nadhem.j.a.alfardan}{kenny.paterson}@rhul

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2010-09-24 10:32:41
      199Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1  Information Security Group, Royal Holloway, University of London, UK

      Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English - Date: 2011-11-29 05:36:51
      200Typesetting the Byzantine Cappelli Philip Taylor The Computer Centre, Royal Holloway, University of London, TW20 0EX, United Kingdom mailto :[removed]

      Typesetting the Byzantine Cappelli Philip Taylor The Computer Centre, Royal Holloway, University of London, TW20 0EX, United Kingdom mailto :[removed]

      Add to Reading List

      Source URL: www.tug.org

      Language: English - Date: 2005-11-23 14:18:23