Daniel V. Bailey

Orcid: 0009-0002-4749-6448

According to our database1, Daniel V. Bailey authored at least 23 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Securing knowledge-based authentication against online attackers.
PhD thesis, 2023

"Someone Definitely Used 0000": Strategies.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2021
On the Security of Smartphone Unlock PINs.
ACM Trans. Priv. Secur., 2021

"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
This PIN Can Be Easily Guessed.
CoRR, 2020

This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2017
"I want my money back!" Limiting Online Password-Guessing Financially.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2014
AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS.
RFC, June, 2014

Statistics on Password Re-use and Adaptive Strength for Financial Accounts.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2012
AES-CCM Cipher Suites for Transport Layer Security (TLS).
RFC, July, 2012

2010
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

2009
Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

The Certicom Challenges ECC2-X.
IACR Cryptol. ePrint Arch., 2009

One-touch Financial Transaction Authentication.
Proceedings of the SECRYPT 2009, 2009

Wireless Authentication and Transaction-Confirmation Token.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

2007
Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Proceedings of the Financial Cryptography and Data Security, 2007

Covert channels in privacy-preserving identification systems.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Shoehorning Security into the EPC Tag Standard.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

2005
High-Power Proxies for Enhancing RFID Privacy and Utility.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

2001
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography.
J. Cryptol., 2001

NTRU in Constrained Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
Elliptic Curve Cryptography on Smart Cards without Coprocessors.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1998
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms.
Proceedings of the Advances in Cryptology, 1998


  Loading...