UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author | Type
Jump to: B | C | G | L
Number of items: 5.

B

Burmester, M.; Desmedt, Y.; (2005) A secure and scalable group key exchange system. Information Processing Letters , 94 (3) pp. 137-143. 10.1016/j.ipl.2005.01.003.

C

Courtois, N.T.; (2005) General principles of algebraic attacks and new design criteria for cipher components. In: Dobbertin, H. and Rijmen, V. and Sowa, A., (eds.) Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. (pp. pp. 67-83). Springer Verlag: Berlin/ Heidelberg, Germany.

G

Gillies, M.; Robertson, D.; Ballin, D.; (2005) Direct Manipulation-like Tools for Designing Intelligent Virtual Agents. In: Intelligent Virtual Agents. (pp. pp. 430-441). Springer-Verlag: Berlin, Germany. Green open access
file

Gillies, M.; Vinayagamoorthy, V.; Robertson, D.; Steed, A.; (2005) A Platform Independent Architecture for Virtual Characters and Avatars. In: Intelligent Virtual Agents. (pp. p. 492). Springer-Verlag: Berlin / Heidelberg, Germany. Green open access
file

L

Lipmaa, H.; Wang, G.; Bao, F.; (2005) Designated verifier signature schemes: attacks, new security notions and a new construction. In: Caires, L. and Italiano, G.F. and Monteiro, L. and Palamidessi, C. and Yung, M., (eds.) Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings. (pp. pp. 459-471). Springer Verlag: Berlin/ Heidelberg, Germany.

This list was generated on Sun Apr 24 02:47:41 2016 BST.