Search results for: Chen, Lily

Showing 1 - 8 results of 8 Refine Results
  1. 1

    Recommendation for key derivation using pseudorandom functions

    Authors: Chen, Lily
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
    Physical Description: 1 online resource (20 unnumbered pages) : illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  2. 2

    Recommendation for key derivation using pseudorandom functions (revised)

    Authors: Chen, Lily
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
    Physical Description: 1 online resource (21 unnumbered pages) : illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  3. 3

    Recommendation for key derivation through extraction-then-expansion

    Authors: Chen, Lily
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
    Physical Description: 1 online resource (17 pages).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  4. 4

    Recommendation for key derivation through extraction-then-expansion

    Authors: Chen, Lily
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
    Physical Description: 1 online resource (17 pages).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  5. 5

    Report on post-quantum cryptography

    Authors: Chen, Lily
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2016
    Other Authors: “…Chen, Lily…”
    Physical Description: 1 online resource (15 pages) : illustrations (black and white).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  6. 6

    Recommendation for EAP methods used in wireless network access authentication

    Authors: Hoeper, Katrin
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
    Other Authors: “…Chen, Lily…”
    Physical Description: 50 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  7. 7

    Recommendation for EAP methods used in wireless network access authentication

    Authors: Hoeper, Katrin
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
    Other Authors: “…Chen, Lily…”
    Physical Description: 1 online resource (53 pages) : illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  8. 8

    Immune homeostasis methods and protocols

    Published: Humana Press ; Springer, 2013
    Springer Nature Complete Protocols: 2013 (Springer Link)
    Electronic eBook