Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chris Hall
@article{DBLP:journals/access/HallD23, author = {Chris Hall and Ivan B. Djordjevic}, title = {Discrete Time Signal Localization Accuracy in Gaussian Noise at Low Signal to Noise Ratios}, journal = {{IEEE} Access}, volume = {11}, pages = {109595--109602}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3322207}, doi = {10.1109/ACCESS.2023.3322207}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HallD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocch/MeineckeHJ22, author = {Christofer Meinecke and Chris Hall and Stefan J{\"{a}}nicke}, title = {Towards Enhancing Virtual Museums by Contextualizing Art through Interactive Visualizations}, journal = {{ACM} Journal on Computing and Cultural Heritage}, volume = {15}, number = {4}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.1145/3527619}, doi = {10.1145/3527619}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocch/MeineckeHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmi/RubenPBSPCMHHUK22, author = {Gary Ruben and Isaac Pinar and Jeremy M. C. Brown and Florian Schaff and James A. Pollock and Kelly J. Crossley and Anton Maksimenko and Chris Hall and Daniel Hausermann and Kentaro Uesugi and Marcus J. Kitchen}, title = {Full Field X-Ray Scatter Tomography}, journal = {{IEEE} Trans. Medical Imaging}, volume = {41}, number = {8}, pages = {2170--2179}, year = {2022}, url = {https://doi.org/10.1109/TMI.2022.3157954}, doi = {10.1109/TMI.2022.3157954}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmi/RubenPBSPCMHHUK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blackseecom/HallD21, author = {Chris Hall and Ivan B. Djordjevic}, title = {Mixer Imbalance Correction in Wireless {OFDM} Systems}, booktitle = {2021 {IEEE} International Black Sea Conference on Communications and Networking, BlackSeaCom 2021, Bucharest, Romania, May 24-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BlackSeaCom52164.2021.9527894}, doi = {10.1109/BLACKSEACOM52164.2021.9527894}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blackseecom/HallD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itag/BeynonBFHHPRMAA16, author = {Meurig Beynon and Russell Boyatt and Jonathan Foss and Chris Hall and Elizabeth Hudnott and Nick Pope and Steve Russ and Hamish Macleod and Dimitris Alimisis and Rene Alimisi and Emmanouil Zoulias and Ilkka Jormanainen and Tapani Toivonen and Piet Kommers and Peter Tomcs{\'{a}}nyi and Michal Winczer}, title = {Playing Games with Observation, Dependency, and Agency in a New Environment for Making Construals}, booktitle = {2016 International Conference on Interactive Technologies and Games, iTAG 2016, Notthingham, United Kingdom, October 26-27, 2016}, pages = {21--28}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/iTAG.2016.11}, doi = {10.1109/ITAG.2016.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itag/BeynonBFHHPRMAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/HallPS16, author = {Chris Hall and Doron Puder and William F. Sawin}, editor = {Daniel Wichs and Yishay Mansour}, title = {Ramanujan coverings of graphs}, booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016}, pages = {533--541}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897518.2897574}, doi = {10.1145/2897518.2897574}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/HallPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itag/BeynonFHRHBKSJS15, author = {Meurig Beynon and Jonathan Foss and Elizabeth Hudnott and Steve Russ and Chris Hall and Russell Boyatt and Emma King and Erkki Sutinen and Ilkka Jormanainen and Carolina Islas Sedano and Andr{\'{e}}s Moreno and Hamish Macleod and Jen Ross and Piet Kommers and Dimitris Alimisis and Emmanouil Zoulias and Rene Alimisi and Peter Tomcs{\'{a}}nyi and Michal Winczer}, title = {Making Construals as a New Digital Skill: Dissolving the Program - and the Programmer - Interface}, booktitle = {2015 International Conference on Interactive Technologies and Games, Nottingham, United Kingdom, October 22-23, 2015}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/iTAG.2015.10}, doi = {10.1109/ITAG.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itag/BeynonFHRHBKSJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HallYZSOMCBA14, author = {Chris Hall and Dongting Yu and Zhi{-}Li Zhang and Jonathan Stout and Andrew M. Odlyzko and Andrew W. Moore and L. Jean Camp and Kevin Benton and Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating with the Enemy on Network Management}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {154--162}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_15}, doi = {10.1007/978-3-319-12400-1\_15}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/HallYZSOMCBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonH14, author = {Ross J. Anderson and Chris Hall}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating with the Enemy on Network Management (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {163--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_16}, doi = {10.1007/978-3-319-12400-1\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuMHA13, author = {Dongting Yu and Andrew W. Moore and Chris Hall and Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Authentication for Resilience: The Case of {SDN}}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {39--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_6}, doi = {10.1007/978-3-642-41717-7\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/YuMHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Hall12, author = {Chris Hall}, title = {Security of the internet and the known unknowns}, journal = {Commun. {ACM}}, volume = {55}, number = {6}, pages = {35--37}, year = {2012}, url = {https://doi.org/10.1145/2184319.2184332}, doi = {10.1145/2184319.2184332}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Hall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/em/BaigH12, author = {Salman Baig and Chris Hall}, title = {Experimental Data for Goldfeld's Conjecture over Function Fields}, journal = {Exp. Math.}, volume = {21}, number = {4}, pages = {362--374}, year = {2012}, url = {https://doi.org/10.1080/10586458.2012.671638}, doi = {10.1080/10586458.2012.671638}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/em/BaigH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/HallACOT11, author = {Chris Hall and Ross J. Anderson and Richard Clayton and Evangelos Ouzounis and Panagiotis Trimintzios}, title = {Resilience of the Internet Interconnection Ecosystem}, booktitle = {10th Annual Workshop on the Economics of Information Security, {WEIS} 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011}, year = {2011}, url = {http://weis2011.econinfosec.org/papers/Resilience\%20of\%20the\%20Internet\%20Interconnection\%20Ecosystem.pdf}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/HallACOT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/HallACOT11a, author = {Chris Hall and Ross J. Anderson and Richard Clayton and Evangelos Ouzounis and Panagiotis Trimintzios}, editor = {Bruce Schneier}, title = {Resilience of the Internet Interconnection Ecosystem}, booktitle = {Economics of Information Security and Privacy {III} [papers from the Tenth Workshop on Economics and Information Security, {WEIS} 2011]}, pages = {119--148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1981-5\_6}, doi = {10.1007/978-1-4614-1981-5\_6}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/HallACOT11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/WastellWBHP09, author = {David Wastell and Susan White and Karen Broadhurst and Chris Hall and Sue Peckover}, editor = {Susan Newell and Edgar A. Whitley and Nancy Pouloudi and Jonathan Wareham and Lars Mathiassen}, title = {The chiasmus of design: Paradoxical outcomes in the e-government reform of {UK} children's services}, booktitle = {17th European Conference on Information Systems, {ECIS} 2009, Verona, Italy, 2009}, pages = {134--145}, year = {2009}, url = {http://aisel.aisnet.org/ecis2009/397}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/WastellWBHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/RostBHSRMBS06, author = {Randi J. Rost and Lars Bishop and Chris Hall and Robert Simpson and Daniel Rice and Brian Murray and Mark Barnes and Timo Suoranta}, editor = {John W. Finnegan and Dave Shreiner}, title = {OpenKODE: an open mobile media development environment}, booktitle = {International Conference on Computer Graphics and Interactive Techniques, {SIGGRAPH} 2006, Boston, Massachusetts, USA, July 30 - August 3, 2006, Courses}, pages = {1}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185657.1185745}, doi = {10.1145/1185657.1185745}, timestamp = {Mon, 15 Mar 2021 16:43:07 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/RostBHSRMBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/Hall06, author = {Chris Hall}, editor = {John W. Finnegan and Dave Shreiner}, title = {OpenGL {ES} Safety Critical}, booktitle = {International Conference on Computer Graphics and Interactive Techniques, {SIGGRAPH} 2006, Boston, Massachusetts, USA, July 30 - August 3, 2006, Courses}, pages = {5}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185657.1185749}, doi = {10.1145/1185657.1185749}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/Hall06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCAicis/HallCD02, author = {Chris Hall and Dar{-}Jen Chang and Ahmed H. Desoky}, editor = {Adel Said Elmaghraby and Robert Dees}, title = {Client/ Server Application for the Analysis of Gene Expressions}, booktitle = {Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, July 18-20, 2002, Boston, Massachusetts, {USA}}, pages = {191--196}, publisher = {{ISCA}}, year = {2002}, timestamp = {Mon, 09 Aug 2021 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/ISCAicis/HallCD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/EllisonHMS00, author = {Carl M. Ellison and Chris Hall and Randy Milbert and Bruce Schneier}, title = {Protecting secret keys with personal entropy}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {4}, pages = {311--318}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00055-2}, doi = {10.1016/S0167-739X(99)00055-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/EllisonHMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KelseySWH00, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, title = {Side Channel Cryptanalysis of Product Ciphers}, journal = {J. Comput. Secur.}, volume = {8}, number = {2/3}, pages = {141--158}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-82-304}, doi = {10.3233/JCS-2000-82-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KelseySWH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HallGS99, author = {Chris Hall and Ian Goldberg and Bruce Schneier}, editor = {Vijay Varadharajan and Yi Mu}, title = {Reaction Attacks against several Public-Key Cryptosystems}, booktitle = {Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1726}, pages = {2--12}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-47942-0\_2}, doi = {10.1007/978-3-540-47942-0\_2}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/HallGS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HallWKS98, author = {Chris Hall and David A. Wagner and John Kelsey and Bruce Schneier}, editor = {Hugo Krawczyk}, title = {Building PRFs from PRPs}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {370--389}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055742}, doi = {10.1007/BFB0055742}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HallWKS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KelseySWH98, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Side Channel Cryptanalysis of Product Ciphers}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {97--110}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055858}, doi = {10.1007/BFB0055858}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KelseySWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HallKSW98, author = {Chris Hall and John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Rafael Hirschfeld}, title = {Cryptanalysis of {SPEED}}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {309--310}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055491}, doi = {10.1007/BFB0055491}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HallKSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseySWH98, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, editor = {Serge Vaudenay}, title = {Cryptanalytic Attacks on Pseudorandom Number Generators}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {168--188}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_12}, doi = {10.1007/3-540-69710-1\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KelseySWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SchneierKWWH98, author = {Bruce Schneier and John Kelsey and Doug Whiting and David A. Wagner and Chris Hall}, editor = {Stafford E. Tavares and Henk Meijer}, title = {On the Twofish Key Schedule}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {27--42}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_3}, doi = {10.1007/3-540-48892-8\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SchneierKWWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HallKRSW98, author = {Chris Hall and John Kelsey and Vincent Rijmen and Bruce Schneier and David A. Wagner}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Cryptanalysis of {SPEED}}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {319--338}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_25}, doi = {10.1007/3-540-48892-8\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchneierH97, author = {Bruce Schneier and Chris Hall}, title = {An Improved E-Mail Security Protocol}, booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997), 8-12 December 1997, San Diego, CA, {USA}}, pages = {227}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSAC.1997.646194}, doi = {10.1109/CSAC.1997.646194}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchneierH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HallS97, author = {Chris Hall and Bruce Schneier}, title = {Remote Electronic Gambling}, booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997), 8-12 December 1997, San Diego, CA, {USA}}, pages = {232--238}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSAC.1997.646195}, doi = {10.1109/CSAC.1997.646195}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HallS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KelseySHW97, author = {John Kelsey and Bruce Schneier and Chris Hall and David A. Wagner}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Secure Applications of Low-Entropy Keys}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {121--134}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030415}, doi = {10.1007/BFB0030415}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KelseySHW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KelseySH96, author = {John Kelsey and Bruce Schneier and Chris Hall}, title = {An Authenticated Camera}, booktitle = {12th Annual Computer Security Applications Conference {(ACSAC} 1996), 9-13 December 1996, San Diego, CA, {USA}}, pages = {24--30}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSAC.1996.569666}, doi = {10.1109/CSAC.1996.569666}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KelseySH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.