Chris Hall

Orcid: 0000-0001-9795-2187

According to our database1, Chris Hall authored at least 29 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Discrete Time Signal Localization Accuracy in Gaussian Noise at Low Signal to Noise Ratios.
IEEE Access, 2023

2022
Towards Enhancing Virtual Museums by Contextualizing Art through Interactive Visualizations.
ACM Journal on Computing and Cultural Heritage, December, 2022

Full Field X-Ray Scatter Tomography.
IEEE Trans. Medical Imaging, 2022

2021
Mixer Imbalance Correction in Wireless OFDM Systems.
Proceedings of the 2021 IEEE International Black Sea Conference on Communications and Networking, 2021

2016
Ramanujan coverings of graphs.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Playing Games with Observation, Dependency, and Agency in a New Environment for Making Construals.
Proceedings of the 2016 International Conference on Interactive Technologies and Games, 2016

2015
Making Construals as a New Digital Skill: Dissolving the Program - and the Programmer - Interface.
Proceedings of the 2015 International Conference on Interactive Technologies and Games, 2015

2014
Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014

Collaborating with the Enemy on Network Management (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

2013
Authentication for Resilience: The Case of SDN.
Proceedings of the Security Protocols XXI, 2013

2012
Experimental Data for Goldfeld's Conjecture over Function Fields.
Exp. Math., 2012

Security of the internet and the known unknowns.
Commun. ACM, 2012

2011
Resilience of the Internet Interconnection Ecosystem.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

2009
The chiasmus of design: Paradoxical outcomes in the e-government reform of UK children's services.
Proceedings of the 17th European Conference on Information Systems, 2009

2006
OpenKODE: an open mobile media development environment.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2006

OpenGL ES Safety Critical.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2006

2002
Client/ Server Application for the Analysis of Gene Expressions.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

2000
Side Channel Cryptanalysis of Product Ciphers.
J. Comput. Secur., 2000

Protecting secret keys with personal entropy.
Future Gener. Comput. Syst., 2000

1999
Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

1997
Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996


  Loading...