Follow
Daniel V Bailey
Title
Cited by
Cited by
Year
Protected resource access control utilizing credentials based on message authentication codes and hash chain values
DV Bailey, WM Duane, A Katz
US Patent 8,984,602, 2015
3512015
Protected resource access control utilizing intermediate values of a hash chain
DV Bailey, WM Duane, E Young
US Patent 8,990,905, 2015
3502015
Optimal extension fields for fast arithmetic in public-key algorithms
DV Bailey, C Paar
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3221998
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
DV Bailey, C Paar
Journal of cryptology 14, 153-176, 2001
2332001
Wireless authentication methods and apparatus
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 9,137,012, 2015
1812015
Vulnerabilities in first-generation RFID-enabled credit cards
TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O'Hare
Lecture Notes in Computer Science Volume: Financial Cryptography 2007 4888, 2007
1792007
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Phipott
US Patent 8,312,519, 2012
1752012
Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry
DV Bailey, RW Griffin
US Patent 8,726,405, 2014
1592014
AES-CCM Cipher Suites for Transport Layer Security (TLS)
D McGrew, D Bailey
RFC 6655, july, 2012
1462012
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,306,942, 2016
1432016
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,118,663, 2015
1422015
Authentication methods and apparatus using pairing protocols and other techniques
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 8,495,372, 2013
1232013
NTRU in constrained devices
DV Bailey, D Coffin, A Elbirt, JH Silverman, AD Woodbury
International Workshop on Cryptographic Hardware and Embedded Systems, 262-272, 2001
1182001
Elliptic curve cryptography on smart cards without coprocessors
AD Woodbury, DV Bailey, C Paar
Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000
1182000
Gaming systems with authentication token support
DV Bailey, BS Kaliski Jr, A Juels, RL Rivest
US Patent 9,280,871, 2016
952016
Proxy device for enhanced privacy in an RFID system
A Juels, DV Bailey, P Syverson
US Patent 7,920,050, 2011
952011
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
902008
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology EPrint Archive, 2009
752009
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
642020
Shoehorning security into the EPC tag standard
DV Bailey, A Juels
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
602006
The system can't perform the operation now. Try again later.
Articles 1–20