dblp.uni-trier.dewww.uni-trier.de

Michael Willett

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
7 Bob Thibadeau, Michael Willett: Trusted Storage: Focus on Use Cases. Security and Management 2006: 515-521
2000
6 Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett: Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. Computers & Security 19(1): 18-20 (2000)
5 Michael Smith, Paul C. van Oorschot, Michael Willett: Cryptographic Information Recovery Using Key Recover. Computers & Security 19(1): 21-27 (2000)
4 Michael Willett: Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. Computers & Security 19(1): 28-30 (2000)
1997
3EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)
1986
2 Michael Willett: The IBM Token-Ring Network: A Functional Perspective. FJCC 1986: 489-497
1983
1 Michael Willett: Trapdoor Knapsacks Without Superincreasing Structure. Inf. Process. Lett. 17(1): 7-11 (1983)

Coauthor Index

1Rosario Gennaro [3]
2Sarbari Gupta [6]
3Paul A. Karger [3]
4Stephen M. Matyas [3] [6]
5Paul C. van Oorschot [5]
6Mohammad Peyravian [3]
7Allen Roginsky [3]
8David Safford [3]
9Michael Smith [5]
10Bob Thibadeau [7]
11Chuck Williams [6]
12Nevenko Zunic [3] [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)