default search action
Chris Hall
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j7]Chris Hall, Ivan B. Djordjevic:
Discrete Time Signal Localization Accuracy in Gaussian Noise at Low Signal to Noise Ratios. IEEE Access 11: 109595-109602 (2023) - 2022
- [j6]Christofer Meinecke, Chris Hall, Stefan Jänicke:
Towards Enhancing Virtual Museums by Contextualizing Art through Interactive Visualizations. ACM Journal on Computing and Cultural Heritage 15(4): 1-26 (2022) - [j5]Gary Ruben, Isaac Pinar, Jeremy M. C. Brown, Florian Schaff, James A. Pollock, Kelly J. Crossley, Anton Maksimenko, Chris Hall, Daniel Hausermann, Kentaro Uesugi, Marcus J. Kitchen:
Full Field X-Ray Scatter Tomography. IEEE Trans. Medical Imaging 41(8): 2170-2179 (2022) - 2012
- [j4]Chris Hall:
Security of the internet and the known unknowns. Commun. ACM 55(6): 35-37 (2012) - [j3]Salman Baig, Chris Hall:
Experimental Data for Goldfeld's Conjecture over Function Fields. Exp. Math. 21(4): 362-374 (2012) - 2000
- [j2]Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier:
Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4): 311-318 (2000) - [j1]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000)
Conference and Workshop Papers
- 2021
- [c24]Chris Hall, Ivan B. Djordjevic:
Mixer Imbalance Correction in Wireless OFDM Systems. BlackSeaCom 2021: 1-6 - 2016
- [c23]Meurig Beynon, Russell Boyatt, Jonathan Foss, Chris Hall, Elizabeth Hudnott, Nick Pope, Steve Russ, Hamish Macleod, Dimitris Alimisis, Rene Alimisi, Emmanouil Zoulias, Ilkka Jormanainen, Tapani Toivonen, Piet Kommers, Peter Tomcsányi, Michal Winczer:
Playing Games with Observation, Dependency, and Agency in a New Environment for Making Construals. iTAG 2016: 21-28 - [c22]Chris Hall, Doron Puder, William F. Sawin:
Ramanujan coverings of graphs. STOC 2016: 533-541 - 2015
- [c21]Meurig Beynon, Jonathan Foss, Elizabeth Hudnott, Steve Russ, Chris Hall, Russell Boyatt, Emma King, Erkki Sutinen, Ilkka Jormanainen, Carolina Islas Sedano, Andrés Moreno, Hamish Macleod, Jen Ross, Piet Kommers, Dimitris Alimisis, Emmanouil Zoulias, Rene Alimisi, Peter Tomcsányi, Michal Winczer:
Making Construals as a New Digital Skill: Dissolving the Program - and the Programmer - Interface. iTAG 2015: 9-16 - 2014
- [c20]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - [c19]Ross J. Anderson, Chris Hall:
Collaborating with the Enemy on Network Management (Transcript of Discussion). Security Protocols Workshop 2014: 163-171 - 2013
- [c18]Dongting Yu, Andrew W. Moore, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. Security Protocols Workshop 2013: 39-44 - 2011
- [c17]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS 2011 - [c16]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS (Springer Volume) 2011: 119-148 - 2009
- [c15]David Wastell, Susan White, Karen Broadhurst, Chris Hall, Sue Peckover:
The chiasmus of design: Paradoxical outcomes in the e-government reform of UK children's services. ECIS 2009: 134-145 - 2006
- [c14]Randi J. Rost, Lars Bishop, Chris Hall, Robert Simpson, Daniel Rice, Brian Murray, Mark Barnes, Timo Suoranta:
OpenKODE: an open mobile media development environment. SIGGRAPH Courses 2006: 1 - [c13]Chris Hall:
OpenGL ES Safety Critical. SIGGRAPH Courses 2006: 5 - 2002
- [c12]Chris Hall, Dar-Jen Chang, Ahmed H. Desoky:
Client/ Server Application for the Analysis of Gene Expressions. IS 2002: 191-196 - 1999
- [c11]Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12 - 1998
- [c10]Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier:
Building PRFs from PRPs. CRYPTO 1998: 370-389 - [c9]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110 - [c8]Chris Hall, John Kelsey, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310 - [c7]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188 - [c6]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42 - [c5]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 - 1997
- [c4]Bruce Schneier, Chris Hall:
An Improved E-Mail Security Protocol. ACSAC 1997: 227- - [c3]Chris Hall, Bruce Schneier:
Remote Electronic Gambling. ACSAC 1997: 232-238 - [c2]John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. ISW 1997: 121-134 - 1996
- [c1]John Kelsey, Bruce Schneier, Chris Hall:
An Authenticated Camera. ACSAC 1996: 24-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint