Michael Roe

Results: 40



#Item
11Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
12Network protocols / Cryptographic protocols / IPv6 / Internet Protocol / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / IPsec / Internet Key Exchange / Network architecture / Computing / Data

Child-proof Authentication for MIPv6 (CAM) Michael Roe Greg O’Shea Microsoft Research Ltd St George House, 1 Guildhall Street

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:35
13Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
14Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
15National Security Agency / Block ciphers / Skipjack / Capstone / Fortezza / Key size / CDMF / Key / Symmetric-key algorithm / Cryptography / Key management / Data Encryption Standard

How to Reverse Engineer an EES Device Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:49
16Internet protocols / Cryptographic protocols / Computer network security / Tunneling protocols / Domain name system / IPsec / Internet Key Exchange / NAT traversal / Virtual private network / Network architecture / Computing / Internet

Experiences with Host-to-Host IPsec Tuomas Aura, Michael Roe, and Anish Mohammed Microsoft Research Abstract. This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporat

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:25:05
17Edmonds / Golf / BBC Wales Sports Personality of the Year / Ian Woosnam

The Woosnam Family of Llandinam and the Edmonds Family of Kerry Michael Roe October 2002 Birth Brief for Ethel Winifred Woosnam Ethel Winifred Woosnam

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2002-10-12 15:35:53
18Computer network security / Network protocols / IPv6 / Cyberwarfare / Mobile IP / Proxy Mobile IPv6 / IP address spoofing / Transmission Control Protocol / IPsec / Network architecture / Computing / Internet Protocol

Security of Internet Location Management Tuomas Aura and Michael Roe Microsoft Research 7 J J Thomson Avenue, Cambridge CB3 0FB, UK {tuomaura,mroe}@microsoft.com Abstract

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:21
19Network protocols / IPv6 / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / Care-of address / Network layer / IPsec / IP address / Network architecture / Internet Protocol / Computing

Designing the Mobile IPv6 Security Protocol Tuomas Aura, Michael Roe April 2006 Technical Report MSR±TR±2006±42

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-04-12 13:50:14
20Lemmas / Mathematics / Applied mathematics / Functional languages / Q / XTR

Reconciling multiple IPsec and firewall policies Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zieli´ nski Microsoft Research Abstract. Manually configuring large firewall policies can be a hard

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-11-28 04:08:52
UPDATE