Author of the publication

TWOPRIME: A Fast Stream Ciphering Algorithm.

, , , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 88-102. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TWOPRIME: A Fast Stream Ciphering Algorithm., , , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 88-102. Springer, (1997)Maximal Dense Intervals of Grammar Forms.. ICALP, volume 317 of Lecture Notes in Computer Science, page 424-438. Springer, (1988)Issues with Applying Cryptography in Wireless Systems.. Theory Is Forever, volume 3113 of Lecture Notes in Computer Science, page 205-215. Springer, (2004)Parental Control with Edge Computing and 5G Networks., , and . FRUCT, page 290-300. IEEE, (2021)Exploring Trust of Mobile Applications Based on User Behaviors., , , and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 212-226. Springer, (2009)Distributed Usage Control., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 562-569. Elsevier, (2011)A Research Model for Trustworthy Pervasive Social Networking., , , and . TrustCom/ISPA/IUCC, page 1522-1527. IEEE Computer Society, (2013)Evaluating the performance and privacy of a token-based collaborative recommender., and . WI, page 1049-1053. ACM, (2017)Hiding Regular Languages.. Grammars and Automata for String Processing, volume 9 of Topics in Computer Mathematics, page 305-316. Taylor and Francis, (2003)Extended Model of Side-Information in Garbling., , and . TrustCom/BigDataSE/ISPA (1), page 950-957. IEEE, (2015)