Benjamin Gittins

According to our database1, Benjamin Gittins authored at least 5 papers between 2007 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Increasing Block Sizes Using Feistel Networks: The Example of the AES.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs.
IACR Cryptol. ePrint Arch., 2011

2010
The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart Grid.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Overview of SLL's proposal in response to NIST's call for new global IdM/CKM designs without public keys.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2007
Rebuttal of overtaking VEST.
IACR Cryptol. ePrint Arch., 2007


  Loading...