Search results for: Chen, Lily
Showing 1 - 8 results of 8
Refine Results
-
1
Recommendation for key derivation using pseudorandom functions
Authors: Chen, Lily
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008Physical Description: 1 online resource (20 unnumbered pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
2
Recommendation for key derivation using pseudorandom functions (revised)
Authors: Chen, Lily
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009Physical Description: 1 online resource (21 unnumbered pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
3
Recommendation for key derivation through extraction-then-expansion
Authors: Chen, Lily
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011Physical Description: 1 online resource (17 pages).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
4
Recommendation for key derivation through extraction-then-expansion
Authors: Chen, Lily
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011Physical Description: 1 online resource (17 pages).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
5
Report on post-quantum cryptography
Authors: Chen, LilyOther Authors: “…Chen, Lily…”
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2016
Physical Description: 1 online resource (15 pages) : illustrations (black and white).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
6
Recommendation for EAP methods used in wireless network access authentication
Authors: Hoeper, KatrinOther Authors: “…Chen, Lily…”
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Physical Description: 50 pages : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
7
Recommendation for EAP methods used in wireless network access authentication
Authors: Hoeper, KatrinOther Authors: “…Chen, Lily…”
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Physical Description: 1 online resource (53 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
8
Immune homeostasis methods and protocols
Published: Humana Press ; Springer, 2013Holdings: Loading…Springer Nature Complete Protocols: 2013 (Springer Link)
Electronic eBook