
Research Area
#Computer science#Computer security#Internet privacy#Encryption#Ledger#Code (cryptography)#Elliptic curve#Pseudorandom number generator#Firmware#Random number generation
SCIE paper information
Papers relevant to ‘Computer science’: 1
Research performance of SCIE papers matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Where did I leave my keys?: lessons from the Juniper Dual EC incident
2018/10 COMMUNICATIONS OF THE ACM 5.41 Impact Factor 2 citations
Papers for author ‘Christina Garman’: 1
Number of published SCIE papers by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Where did I leave my keys?: lessons from the Juniper Dual EC incident
2018/10 COMMUNICATIONS OF THE ACM 5.41 Impact Factor 2 citations
conference information
Papers relevant to ‘Computer science’: 8
Research performance of Top-tier Conference matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Zerocash: Decentralized Anonymous Payments from Bitcoin
2014/05 S&P Top-tier Conference 1521 citations
Decentralized Anonymous Credentials
2014/01 NDSS Top-tier Conference 104 citations
Papers for author ‘Christina Garman’: 8
Number of published Top-tier Conference by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Zerocash: Decentralized Anonymous Payments from Bitcoin
2014/05 S&P Top-tier Conference 1521 citations
Decentralized Anonymous Credentials
2014/01 NDSS Top-tier Conference 104 citations
Log in to PhD.GO
Access the Bookmarks
Add or remove professors and programs of interest from your Bookmarks
Subscribe to the graduate program newsletters that you've bookmarked
Enter your test results to ensure you meet the minimum for each graduate program at Bookmarks
At a glance, see program deadlines you've bookmarked on your calendar