Author of the publication

On the security of Wu and Yeh's conference key distribution system.

, , , and . Computer Communications, 18 (12): 978-981 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameterized Looped Schedules for Compact Representation of Execution Sequences in DSP Hardware and Software Implementation., , , , , and . IEEE Trans. Signal Processing, 55 (6-2): 3126-3138 (2007)Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls., , and . ACM Trans. Embedded Comput. Syst., 6 (2): 14 (2007)On the security of Wu and Yeh's conference key distribution system., , , and . Computer Communications, 18 (12): 978-981 (1995)Memory-constrained Block Processing Optimization for Synthesis of DSP Software., , and . ICSAMOS, page 137-143. IEEE, (2006)Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem., , and . Computer Communications, 17 (9): 674-676 (1994)Two Attacks on Neuman-Stubblebine Authentication Protocols., , , , and . Inf. Process. Lett., 53 (2): 103-107 (1995)Efficient simulation of critical synchronous dataflow graphs., , , , and . DAC, page 893-898. ACM, (2006)Parameterized Looped Schedules for Compact Representationof Execution Sequences., , and . ASAP, page 223-230. IEEE Computer Society, (2006)Efficient simulation of critical synchronous dataflow graphs., , , , and . ACM Trans. Design Autom. Electr. Syst., 12 (3): 21:1-21:28 (2007)Partitioning for DSP Software Synthesis., and . SCOPES, volume 2826 of Lecture Notes in Computer Science, page 344-358. Springer, (2003)