Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Jennifer Seberry
Codes Identifying Bad Signatures in Batches
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Internal Structure of Alpha-Mac
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Covert Distributed Computing Using Java Through Web Spoofing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Crypto Topics and Applications II
Chapman & Hall/CRC Applied Algorithms and Data Structures series
Information Security Issues in Mobile Computing
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Key Scheduling in Des Type Cryptosystems
Some Remarks on Authentication Systems
‹
1
2