Agnes Hui Chan

According to our database1, Agnes Hui Chan authored at least 35 papers between 1979 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Resizable Tree-Based Oblivious RAM.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Efficient Private File Retrieval by Combining ORAM and PIR.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR.
IACR Cryptol. ePrint Arch., 2013

2012
PIRMAP: Efficient Private Information Retrieval for MapReduce.
IACR Cryptol. ePrint Arch., 2012

2011
Dedicated vs. distributed: A study of mission survivability metrics.
Proceedings of the MILCOM 2011, 2011

2009
Approximation Algorithms for Key Management in Secure Multicast.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2005
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).
Proceedings of the Networking, 2005

2003
More Efficient Password Authenticated Key Exchange Based on RSA.
Proceedings of the Progress in Cryptology, 2003

2002
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.
Proceedings of the Advances in Cryptology, 2001

The Performance Measurement of Cryptographic Primitives on Palm Devices.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Analysis of IS-95 CDMA Voice Privacy.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

The Software-Oriented Stream Cipher SSC2.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000

1998
Easy Come - Easy Go Divisible Cash.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Electronic Commerce.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

1996
Mis-representation of Identities in E-cash Schemes and how to Prevent it.
Proceedings of the Advances in Cryptology, 1996

1993
Cascaded GMW sequences.
IEEE Trans. Inf. Theory, 1993

Cross-Correlations of Linearly and Quadratically Related Geometric Sequences and GMW Sequences.
Discret. Appl. Math., 1993

On Quadratic M-Sequences.
Proceedings of the Fast Software Encryption, 1993

1992
Threshold Schemes with Disenrollment.
Proceedings of the Advances in Cryptology, 1992

1990
On the linear complexity of feedback registers.
IEEE Trans. Inf. Theory, 1990

On the quadratic spans of DeBruijn sequences.
IEEE Trans. Inf. Theory, 1990

On the linear span of binary sequences obtained from q-ary m-sequences, q odd.
IEEE Trans. Inf. Theory, 1990

Correlation Functions of Geometric Sequences.
Proceedings of the Advances in Cryptology, 1990

1989
On the Linear Complexity of Feedback Registers (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

On the Quadratic Spans of Periodic Sequences.
Proceedings of the Advances in Cryptology, 1989

1987
Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs.
IEEE Trans. Computers, 1987

1986
On the Linear Span of binary Sequences Obtained from Finite Geometries.
Proceedings of the Advances in Cryptology, 1986

1983
A fast algorithm for determining the complexity of a binary sequence with period 2<sup>n</sup>.
IEEE Trans. Inf. Theory, 1983

1982
Embedding of a Pseudo-residual Design into a Möbius Plane.
J. Comb. Theory, Ser. A, 1982

On the Complexities of de Bruijn Sequences.
J. Comb. Theory, Ser. A, 1982

1981
(n, k, t)-covering systems and error-trapping decoding.
IEEE Trans. Inf. Theory, 1981

Embedding of a pseudo-point residual design into a Möbius plane.
Discret. Math., 1981

1979
Characterization of "Linegraph of an Affine Space".
J. Comb. Theory, Ser. A, 1979


  Loading...