Tom Dowling

According to our database1, Tom Dowling authored at least 17 papers between 1985 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
WiField, an IEEE 802.11-based agricultural sensor data gathering and logging platform.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017

2011
Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks.
Ad Hoc Networks, 2011

2009
Secure and Efficient Group Key Agreements for Cluster Based Networks.
Trans. Comput. Sci., 2009

Enhanced Access Polynomial Based Self-healing Key Distribution.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

2007
A Biometric Identity Based Signature Scheme.
Int. J. Netw. Secur., 2007

A Framework for the Development and Testing of Cryptographic Software.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007

2004
A Biometric Identity Based Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

An Identity Based Encryption system.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

An object oriented approach to an identity based encryption cryptosystem.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

Rapid prototyping and performance analysis of elliptic curve cryptographic algorithms using Java and Maple.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

A Java API for Experimental analysis of algorithms.
Proceedings of the IASTED International Conference on Software Engineering, 2004

2003
A Java API for polynomial arithmetic.
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

A Java implemented key collision attack on the data encryption standard (DES).
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

A Java OpenCard framework based medical smartcard system.
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

2002
A Java implementation of an elliptic curve cryptosystem.
Proceedings of the naugural International Symposium on Principles and Practice of Programming in Java, 2002

1985
Performance and productivity on unconventional operating systems (panel).
Proceedings of the 1985 ACM annual conference on The range of computing: mid-80's perspective: mid-80's perspective, 1985


  Loading...