Accepting PhD Students

PhD projects

Malicious AI, AI for Security/Privacy, Crypto, Facial Analysis, Human Emotions

20012025

Research activity per year

Filter
Chapter (Book)

Search results

  • 2014

    BLAKE2

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 165-183 19 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

    9 Citations (Scopus)
  • BLAKE in Hardware

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 97-105 9 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

    1 Citation (Scopus)
  • BLAKE in Software

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 55-95 41 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • Conclusion

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 185 1 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Otherpeer-review

  • Design Rationale

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 107-129 23 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • Introduction

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 1-7 7 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Otherpeer-review

    1 Citation (Scopus)
  • Preliminaries

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 9-35 27 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • Security of BLAKE

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 131-163 33 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • Specification of BLAKE

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 37-44 8 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • Using BLAKE

    Aumasson, J. P., Meier, W., Phan, R. C. W. & Henzen, L., 2014, Information Security and Cryptography. Springer, p. 45-54 10 p. (Information Security and Cryptography; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

    2 Citations (Scopus)
  • 2012

    Fooling a liveness-detecting capacitive fingerprint scanner

    Bowden-Peters, E., Phan, R. C. W., Whitley, J. N. & Parish, D. J., 2012, Cryptography and Security: FromTheory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Naccache, D. (ed.). p. 484-490 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6805 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

    10 Citations (Scopus)
  • 2010

    Towards an integrated network security framework using the Y-Comm architecture

    Mapp, G., Crowcroft, J. & Phan, R., 1 Jan 2010, Handbook of Electronic Security and Digital Forensics. World Scientific Publishing, p. 169-184 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • 2006

    Communication security technologies in smart organizations

    Phan, R. C. W., 2006, Integration of ICT in Smart Organizations. IGI Global, p. 333-353 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

  • RFID systems: applications vs. security and privacy implications

    Wong, D. M. L. & Phan, R. C. W., 2006, Web Services Security and E-Business. IGI Global, p. 57-74 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

    1 Citation (Scopus)
  • Subtle interactions: security protocols and cipher modes of operation

    Phan, R. C. W. & Goi, B. M., 2006, Web Services Security and E-Business. IGI Global, p. 239-261 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review