default search action
Kim Nguyen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Kim Nguyen 0001 — Université Paris-Sud, Orsay, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Kim Nguyen:
Ein sicheres und vertrauenswürdiges ID-Ökosystem - ein wichtiges Ziel für Europa! Datenschutz und Datensicherheit (dud) 48(4): 209 (2024) - 2022
- [j12]Kim Nguyen:
Sichere elektronische Identität - ein Ziel für Europa! Datenschutz und Datensicherheit 46(1): 1 (2022) - [j11]Arno Fiedler, Ernst-Günter Giessmann, Kim Nguyen:
Die Bedeutung von PKI - Gestern, Heute und Morgen. Datenschutz und Datensicherheit 46(4): 209-214 (2022) - [j10]Enrico Entschew, Kirk Hall, Chris Bailey, Kim Nguyen:
A New eIDAS Beginning for QWACs. Datenschutz und Datensicherheit 46(4): 217-224 (2022) - [c6]Shivani Mehta, Anna Rubinsky, Courtney R. Lyles, Kathryn Kemper, Kim Nguyen, Laura M. Gottlieb, Urmimala Sarkar, William Brown III:
Comparative Analysis of Social Connections/Isolation and Stress Documentation in Structured and Unstructured Machine De-Identified Data using PatientExploreR and EMERSE. AMIA 2022 - 2021
- [i3]Frank Byszio, Klaus-Dieter Wirth, Kim Nguyen:
Intelligent Composed Algorithms. IACR Cryptol. ePrint Arch. 2021: 813 (2021) - 2020
- [j9]Kim Nguyen:
Vertrauen ist die Basis für Digitale Souveränität. Datenschutz und Datensicherheit 44(4): 221 (2020) - [j8]Kim Nguyen:
Der Lebenszyklus von Souveränität und Vertrauen. Datenschutz und Datensicherheit 44(4): 228-230 (2020)
2010 – 2019
- 2018
- [j7]Kim Nguyen:
Certification of eIDAS trust services and new global transparency trends. Datenschutz und Datensicherheit 42(7): 424-428 (2018) - [c5]Jordan Richard Schoenherr, Kim Nguyen:
Multi-Agent Accumulator-Based Decision-Making Model of Incivility (MADI). SBP-BRiMS 2018: 76-81 - [p1]Kim Nguyen:
"Entscheidend ist das Nicht-Digitale": Digitale Souveränität zwischen nationalen Vorgaben und globalen Anwendungen. Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht (1) 2018: 317-324 - 2017
- [j6]Kim Nguyen:
Zertifizierungsdienste in der Post-Quantum-Ära. Datenschutz und Datensicherheit 41(1): 17-20 (2017) - [i2]Jameson Tyler Merkow, Robert B. Lufkin, Kim Nguyen, Stefano Soatto, Zhuowen Tu, Andrea Vedaldi:
DeepRadiologyNet: Radiologist Level Pathology Detection in CT Head Images. CoRR abs/1711.09313 (2017) - 2016
- [j5]Enrico Entschew, Kim Nguyen:
Neue Anwendungsszenarien für die 2-Faktor Authentifizierung. Datenschutz und Datensicherheit 40(4): 231-234 (2016) - 2015
- [c4]Malte Kahrs, Kim Nguyen:
Future Ecosystems for Secure Authentication and Identification. ISSE 2015: 12-21 - 2014
- [j4]Kim Nguyen:
Authentification and identification - Taking the user into account. Datenschutz und Datensicherheit 38(7): 467-469 (2014) - 2013
- [j3]Kim Nguyen, Carsten Schwarz:
Innovatives Key Management für die Qualifizierte Elektronische Signatur mit dem neuen Personalausweis. Datenschutz und Datensicherheit 37(8): 502-506 (2013) - 2011
- [r5]Kim Nguyen:
Index Calculus Method. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 597-600 - [r4]Kim Nguyen:
Smoothness. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1227
2000 – 2009
- 2009
- [j2]Shu Chen, Konstantin A. Korolev, Joshua Kupershmidt, Kim Nguyen, Mohammed N. Afsar:
High-Resolution High-Power Quasi-Optical Free-Space Spectrometer for Dielectric and Magnetic Measurements in Millimeter Waves. IEEE Trans. Instrum. Meas. 58(8): 2671-2678 (2009) - [c3]Jakob Otkjær Bak, Kim Nguyen, Peter Risgaard, Jan Stage:
Bringing Usability Evaluation into Practice: Field Studies in Two Software Organization. I-USED 2009 - 2008
- [c2]Jakob Otkjær Bak, Kim Nguyen, Peter Risgaard, Jan Stage:
Obstacles to usability evaluation in practice: a survey of software development organizations. NordiCHI 2008: 23-32 - 2005
- [e1]Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, Frederik Vercauteren:
Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall/CRC 2005, ISBN 978-1-58488-518-4 [contents] - [r3]Kim Nguyen, Andrew Weigl:
Fast Arithmetic in Hardware. Handbook of Elliptic and Hyperelliptic Curve Cryptography 2005: 616-646 - [r2]Kim Nguyen:
Index Calculus. Encyclopedia of Cryptography and Security 2005 - [r1]Kim Nguyen:
Smoothness. Encyclopedia of Cryptography and Security 2005 - 2003
- [j1]Antoine Joux, Kim Nguyen:
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. J. Cryptol. 16(4): 239-247 (2003) - 2001
- [i1]Antoine Joux, Kim Nguyen:
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. IACR Cryptol. ePrint Arch. 2001: 3 (2001)
1990 – 1999
- 1996
- [c1]Francisco V. Cipolla Ficarra, Punyashloke Mishra, Kim Nguyen, Blair Nonnecke, Jennifer Preece, Gary Marchionini:
Evaluation. Hypertext 1996: 260
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint