Debra L. Cook

According to our database1, Debra L. Cook authored at least 19 papers between 2003 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Practical and privacy-preserving information retrieval from a database table.
J. Comput. Secur., 2016

2014
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2009
Phishwish: a simple and stateless phishing filter.
Secur. Commun. Networks, 2009

Elastic block ciphers: method, security and instantiations.
Int. J. Inf. Sec., 2009

2008
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
IACR Cryptol. ePrint Arch., 2008

Phishwish: A Stateless Phishing Filter Using Minimal Rules.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
Proceedings of the Information Security, 10th International Conference, 2007

A Case Study on Constructing a Security Event Management System.
Proceedings of the IT-Incidents Management & IT-Forensics, 2007

Elastic block ciphers: the basic design.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
CryptoGraphics - Exploiting Graphics Cards for Security
Advances in Information Security 20, Springer, ISBN: 978-0-387-29015-7, 2006

2005
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Comput. Networks, 2005

Conversion and Proxy Functions for Symmetric Key Ciphers.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
Proceedings of the Topics in Cryptology, 2005

2004
Elastic AES.
IACR Cryptol. ePrint Arch., 2004

Elastic Block Ciphers.
IACR Cryptol. ePrint Arch., 2004

2003
WebSOS: protecting web servers from DDoS attacks.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Using graphic turing tests to counter automated DDoS attacks against web servers.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...