| 2007 |
22 | | Jie Lian,
Lei Chen,
Kshirasagar Naik,
Yunhao Liu,
Gordon B. Agnew:
Gradient Boundary Detection for Time Series Snapshot Construction in Sensor Networks.
IEEE Trans. Parallel Distrib. Syst. 18(10): 1462-1475 (2007) |
21 | | Jie Lian,
Kshirasagar Naik,
Gordon B. Agnew:
A framework for evaluating the performance of cluster algorithms for hierarchical networks.
IEEE/ACM Trans. Netw. 15(6): 1478-1489 (2007) |
| 2006 |
20 | | Kiarash Narimani,
Gordon B. Agnew:
Key Management and Mutual Authentication for Multiple Field Records Smart Cards.
ITNG 2006: 568-569 |
19 | | Jie Lian,
Kshirasagar Naik,
Gordon B. Agnew,
Lei Chen,
M. Tamer Özsu:
BBS: An Energy Efficient Localized Routing Scheme for Query Processing in Wireless Sensor Networks.
IJDSN 2(1): 23-54 (2006) |
18 | | Jie Lian,
Kshirasagar Naik,
Gordon B. Agnew:
Data Capacity Improvement of Wireless Sensor Networks Using Non-Uniform Sensor Distribution.
IJDSN 2(2): 121-145 (2006) |
| 2005 |
17 | | Jie Lian,
Lei Chen,
Kshirasagar Naik,
M. Tamer Özsu,
Gordon B. Agnew:
Localized routing trees for query processing in sensor networks.
CIKM 2005: 259-260 |
| 2004 |
16 | | Jie Lian,
S. Naik,
Gordon B. Agnew:
Optimal solution of total routing table size for hierarchical networks.
ISCC 2004: 834-839 |
| 2002 |
15 | | Gordon B. Agnew,
A. Sivanandan:
A fast method for determining the origins of documents based on LZW compression.
Int. J. on Digital Libraries 3(4): 297-301 (2002) |
| 2001 |
14 | | Oda Sans,
Gordon B. Agnew:
An Efficient Multiple Merchants Payment Protocol for Secure Electronic Transactions Based on Purchase Consolidation.
ISEC 2001: 1-19 |
| 1993 |
13 | | J. Fernández-González,
Gordon B. Agnew,
Arturo Ribagorda:
Encryption and error correction codes for reliable file storage.
Computers & Security 12(5): 501-510 (1993) |
12 | | Gordon B. Agnew,
Ronald C. Mullin,
Scott A. Vanstone:
An Implementation of Elliptic Curve Cryptosystems Over F2155.
IEEE Journal on Selected Areas in Communications 11(5): 804-813 (1993) |
11 | | Gordon B. Agnew,
Thomas Beth,
Ronald C. Mullin,
Scott A. Vanstone:
Arithmetic Operations in GF(2m).
J. Cryptology 6(1): 3-13 (1993) |
| 1992 |
10 | | Gordon B. Agnew,
Ronald C. Mullin,
Scott A. Vanstone:
On the Development of a Fast Elliptic Curve Cryptosystem.
EUROCRYPT 1992: 482-487 |
| 1991 |
9 | | Gordon B. Agnew,
Ronald C. Mullin,
I. M. Onyszchuk,
Scott A. Vanstone:
An Implementation for a Fast Public-Key Cryptosystem.
J. Cryptology 3(2): 63-79 (1991) |
| 1990 |
8 | | Gordon B. Agnew:
Cryptographic systems using redundancy.
IEEE Transactions on Information Theory 36(1): 31-39 (1990) |
| 1989 |
7 | | Gordon B. Agnew,
Ronald C. Mullin,
Scott A. Vanstone:
A Fast Elliptic Curve Cryptosystem.
EUROCRYPT 1989: 706-708 |
| 1988 |
6 | | Gordon B. Agnew,
Ronald C. Mullin,
Scott A. Vanstone:
An Interactive Data Exchange Protocol Based on Discrete Exponentiation.
EUROCRYPT 1988: 159-166 |
5 | | Gordon B. Agnew,
Ronald C. Mullin,
Scott A. Vanstone:
Fast Exponentiation in GF(2n).
EUROCRYPT 1988: 251-255 |
| 1987 |
4 | | Gordon B. Agnew:
Random Sources for Cryptographic Systems.
EUROCRYPT 1987: 77-81 |
| 1986 |
3 | | Gordon B. Agnew:
Another Look at Redundancy in Cryptographic Systems.
EUROCRYPT 1986: 29 |
| 1985 |
2 | | Gordon B. Agnew:
Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks.
EUROCRYPT 1985: 221-230 |
| 1984 |
1 | | Gordon B. Agnew:
Secrecy and Privacy in a Local Area Network Environment.
EUROCRYPT 1984: 349-363 |