• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1985 …2020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2003

    Attacking an obfuscated cipher by injecting faults

    Jacob, M., Boneh, D. & Felten, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Feigenbaum, J. (ed.). Springer Verlag, p. 16-31 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2696).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    42 Scopus citations
  • 2000

    Efficient commerce protocols based on one-time pads

    Schneider, M. A. & Felten, E. W., 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 317-326 10 p. 898886

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations