dblp.uni-trier.dewww.uni-trier.de

Brian King

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
25EEBrian King: wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. ACNS 2008: 429-445
24EEYvo Desmedt, Brian King, Berry Schoenmakers: Revisiting the Karnin, Greene and Hellman Bounds. ICITS 2008: 183-198
23EEBrian King, Chittibabu Guda: Semi-supervised learning for classification of protein sequence data. Scientific Programming 16(1): 5-29 (2008)
2007
22EEBrian King, Xiaolan Zhang: Securing the Pharmaceutical Supply Chain using RFID. MUE 2007: 23-28
21EEXiaolan Zhang, Brian King: An Anti-Counterfeiting RFID Privacy Protection Protocol. J. Comput. Sci. Technol. 22(3): 438-448 (2007)
20EESining Liu, Brian King, Wei Wang: Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. MONET 12(4): 271-279 (2007)
2006
19EESining Liu, Brian King, Wei Wang: A CRT-RSA Algorithm Secure against Hardware Fault Attacks. DASC 2006: 51-60
18EESining Liu, F. Bowen, Brian King, Wei Wang: Elliptic curves cryptosystem implementation based on a look-up table sharing scheme. ISCAS 2006
2005
17EEBrian King: An Efficient Implementation of a Threshold RSA Signature Scheme. ACISP 2005: 382-393
16EEXiaolan Zhang, Brian King: Modeling RFID Security. CISC 2005: 75-90
15EEBrian King, Yvo Desmedt: Securing Abstention in an Electronic Legislature. HICSS 2005
14EEXiaolan Zhang, Brian King: Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. ISC 2005: 474-481
13 Elias Haddad, Brian King: Anonymous Simple Secure M-Commerce Protocol. PSC 2005: 199-205
12 Paul Salama, Brian King: Efficient secure image transmission: compression integrated with encryption. Security, Steganography, and Watermarking of Multimedia Contents 2005: 47-58
2004
11EEBrian King, Ben Rubin: Improvements to the Point Halving Algorithm. ACISP 2004: 262-276
10EEBrian King: A Point Compression Method for Elliptic Curves Defined over GF(2 n). Public Key Cryptography 2004: 333-345
2003
9EEBrian King: A Comment on Group Independent Threshold Sharing. WISA 2003: 425-441
2002
8EEBrian King: Requirements for Group Independent Linear Threshold Secret Sharing Schemes. ACISP 2002: 89-106
7EEYvo Desmedt, Brian King: Verifiable Democracy a Protocol to Secure an Electronic Legislature. EGOV 2002: 460-463
2001
6EEBrian King: Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. ACISP 2001: 376-391
5EEBrian King: An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. Selected Areas in Cryptography 2001: 134-150
2000
4 Brian King: Algorithms to Speed Up Computations in Threshold RSA. ACISP 2000: 443-456
3EEBrian King: Improved Methods to Perform Threshold RSA. ASIACRYPT 2000: 359-372
1999
2 Yvo Desmedt, Brian King: Verifiable Democracy. Communications and Multimedia Security 1999: 53-70
1998
1EEYvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa: A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. ACISP 1998: 391-402

Coauthor Index

1F. Bowen [18]
2Yvo Desmedt [1] [2] [7] [15] [24]
3Chittibabu Guda [23]
4Elias Haddad [13]
5Wataru Kishimoto [1]
6Kaoru Kurosawa [1]
7Sining Liu [18] [19] [20]
8Ben Rubin [11]
9Paul Salama [12]
10Berry Schoenmakers [24]
11Wei Wang [18] [19] [20]
12Xiaolan Zhang [14] [16] [21] [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)