UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Number of items: 9.

Article

Buldas, A; Laud, P; Lipmaa, H; (2002) Eliminating Counterevidence with Applications to Accountable Certificate Management. Journal of Computer Security , 10 (3) 273 - 296.

Buldas, A.; Laud, P.; Lipmaa, H.; (2002) Eliminating counterevidence with applications to accountable certificate management. Journal of Computer Security , 10 (3) pp. 273-296.

Proceedings paper

Kolmogorov, V.; Zabih, R.; (2002) Multi-camera scene reconstruction via graph cuts. In: Goos, G. and Hartmanis, J. and van Leeuwen, J., (eds.) Computer Vision — ECCV 2002: 7th European Conference on Computer Vision Copenhagen, Denmark, May 28–31, 2002 Proceedings, Part III. (pp. pp. 8-40). Springer Verlag: Berlin/ Heidelberg, Germany.

Lipmaa, H; (2002) Fast Software Implementations of SC2000. In: Chan, A and Gligor, V, (eds.) Lecture Notes in Computer Science. (pp. 63 - 74). Springer-Verlag

Lipmaa, H; (2002) On Optimal Hash Tree Traversal for Interval Time-Stamping. In: Chan, A and Gligor, V, (eds.) Lecture Notes in Computer Science. (pp. 357 - 371). Springer-Verlag

Lipmaa, H; (2002) On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. In: Menezes, A and Sarkar, P, (eds.) Lecture Notes in Computer Science. (pp. 48 - 61). Springer-Verlag

Lipmaa, H; Asokan, N; Niemi, V; (2002) Secure Vickrey Auctions without Threshold Trust. In: Blaze, M, (ed.) Lecture Notes in Computer Science. (pp. 87 - 101). Springer-Verlag

Takenaka, M; Lipmaa, H; Torii, N; (2002) The Implementation of The Block Cipher SC2000 (III). In: (Proceedings) ISEC Technical group meeting.

Report

Lipmaa, H; (2002) On Optimal Hash Tree Traversal for Interval Time-Stamping. (IACR ePrint Archive 2002/124 ). IACR

This list was generated on Sun Jul 27 03:07:42 2014 BST.