Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Johnson, Don, Alfred Menezes, and Scott Vanstone. "The elliptic curve digital signature algorithm (ecdsa)." International journal of information security 1, no. 1 (2001): 36-63. Koblitz, Neal. "Elliptic curve cryptosystems." Mathematics of computation 48, no. 177 (1987): 203-209. Koblitz, Neal. Algebraic aspects of cryptography . Springer, 1998. Menezes, Alfred. "Elliptic curve crypto systems." CryptoBytes 1, no. 2 (1995). Miller, Victor S.. Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985. P Reddy, Vasudeva, and Mokkala Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (2007): 697-705. Rivest, Ronald, Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126. Schoof, Rene. "Elliptic curves over finite fi elds and the computation of the square roots modulo p." Mathematics of Computation 44, no. 177 (1984): 483-494. Sklavos, Nicolas, and Odysseas Koufopavlou. On the hardware implementations of the sha-2 (256, 384, 512) hash functions In Proceedings of the 2003 International Symposium on Circuits and Systems. Bangkok, Thailand: ISCAS '03, 2003. Washington, Lawrence C.. Elliptic curves: number theory and cryptography. CRC press, 2008. Abolhassan, Ferri. The Drivers of Digital Transformation, Why There's No Way Around the Cloud. Switzerland: Springer International Publishing, 2017. Ackerman, Robert K... NATO Treads Carefully Toward a Digital Future., 2018. Allen, John R., Giampaolo di Paola, Wolf Langheld, Julian Lindley-French, Tomas Valasek, and Alexander Vershbow. "One Alliance: The Future Tasks of the Adapted Alliance." GLOBSEC Ideas Shaping the World (2017). R., Anderson Wendy, and Jim Townsend. "As AI Begins to Reshape Defense, Here's How Europe Can Keep up." Defense One (2018). Duff-Brown, Beth. "At Stanford, Secretary of Defense Ashton Carter unveils cyber strategy, calls for renewed partnership with Silicon Valley." Stanford News (2015). Fertasi, Nadia El, and Diana DeVivo. "Resilient for how long? Information technology warfare in the 21st century: The Alliance's invisible threat." Vox Collegii Magazine XIII (2016). Performance audit report to Council on the need to improve NATO’s capability package process. International Board of Auditors for NATO (IBAN), 2017. Kane, Gerald, Doug Palmer, Anh Nguyen Phillips, David Kiron, and Natasha Buckley. "Strategy, not Technology, Drives Digital Transformation: Becoming a Digitally Mature Enterprise." IT Sloan Management Review (2015): July 14, 2015. "Ambitious Framwork Nation: Germany in NATO. Bundeswehr Capability Planning and the 'Framework Nations Concept'." SWP Comments (German Institute for International and Security Affairs) 35 (2017). McChrystal, Stanley, Tantum Collins, David Silverman, and Chris Fussell. Team of Teams: New Rules of Engagement for a Complex World. New York: Penguin, 2015. Mercier, Denis. "How will artificial intelligence and disruptive technologies transform military operations and organizations?" In NATO Science and Technology Organisation conference Bordeaux. Bordeaux: NATO Supreme Allied Commander Transformation, 2018. Affairs, Denmark Ministry o. TechPlomacy. Office of Denmark's Tech Ambassador, 2018. Group, NATO Industrial. Chairman & Vice-Chairman's Corner., 2018. NATS (UK's leading provider of air traffic control services)., 2018. Ness, Susan, and Peter Chase. How GDPR Could Affect the Transatlantic Relationship. GMF (The German Marshall Fund), 2018. Pages« първа ‹ предишна … 325 326 327 328 329 330 331 332 333 … следваща › последна »