Alex Tsow

According to our database1, Alex Tsow authored at least 8 papers between 2000 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Deterring voluntary trace disclosure in re-encryption mix-networks.
ACM Trans. Inf. Syst. Secur., 2010

2009
A privacy-aware architecture for a Web rating system.
IBM J. Res. Dev., 2009

An Improved Recovery Algorithm for Decayed AES Key Schedule Images.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

2007
What Instills Trust? A Qualitative Study of Phishing.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digit. Forensic Pract., 2006

Phishing with Consumer Electronics - Malicious Home Routers.
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006

2005
Data Refinement for Synchronous System Specification and Construction.
Proceedings of the Correct Hardware Design and Verification Methods, 2005

2000
Visualizing System Factorizations with Behavior Tables.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000


  Loading...