2006 |
7 | | Bob Thibadeau,
Michael Willett:
Trusted Storage: Focus on Use Cases.
Security and Management 2006: 515-521 |
2000 |
6 | | Chuck Williams,
Nevenko Zunic,
Stephen M. Matyas,
Sarbari Gupta,
Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Computers & Security 19(1): 18-20 (2000) |
5 | | Michael Smith,
Paul C. van Oorschot,
Michael Willett:
Cryptographic Information Recovery Using Key Recover.
Computers & Security 19(1): 21-27 (2000) |
4 | | Michael Willett:
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products.
Computers & Security 19(1): 28-30 (2000) |
1997 |
3 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
1986 |
2 | | Michael Willett:
The IBM Token-Ring Network: A Functional Perspective.
FJCC 1986: 489-497 |
1983 |
1 | | Michael Willett:
Trapdoor Knapsacks Without Superincreasing Structure.
Inf. Process. Lett. 17(1): 7-11 (1983) |