The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Journal on Selected Areas in Communications
1993, volume: 11, number: 5

  1. Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer
    Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal]
  2. Li Gong
    Increasing Availability and Security of an Authentication Service. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:657-662 [Journal]
  3. Raymond L. Pickholtz, David B. Newman Jr., Ya-Qin Zhang, Makoto Tatebayashi
    Security Analysis of the INTELSAT VI and VII Command Network. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:663-672 [Journal]
  4. Robert M. Gagliardi
    LPI in Pulsed Laser Space Communications. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:673-678 [Journal]
  5. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal]
  6. Colin Boyd
    Security Architectures Using Formal Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:694-701 [Journal]
  7. Marie-Jeanne Toussaint
    A New Method for Analyzing the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:702-714 [Journal]
  8. Yuliang Zheng, Jennifer Seberry
    Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal]
  9. Chin-Chen Chang, Horng-Chin Lee
    A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:725-729 [Journal]
  10. Shigeo Tsujii, Jinhui Chao, Kiyomiche Araki
    A Simple ID-Based Scheme for Key Sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:730-734 [Journal]
  11. Bruce Goldburg, S. Sridharan, Ed Dawson
    Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:735-744 [Journal]
  12. Chyan Yang, Chien-Chao Tsai
    Managing Secure Communications With Multilevel Security and Restricted Character Set Translation. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:745-756 [Journal]
  13. Lein Harn, Shoubao Yang
    ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:757-760 [Journal]
  14. Benjamin Arazi
    Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:761-769 [Journal]
  15. Willard Wells, Russell Stone, Edward Miles
    Secure Communications by Optical Homodyne. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:770-777 [Journal]
  16. Shin-ichi Kawamura, Ashushi Shimbo
    Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:778-784 [Journal]
  17. Walter Fumy, Peter Landrock
    Principles of Key Management. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:785-793 [Journal]
  18. Francisco Recacha, José L. Melús, X. Simón, Miguel Soriano, Jordi Forné
    Secure Data Transmission in Extended Ethernet Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:794-803 [Journal]
  19. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
    An Implementation of Elliptic Curve Cryptosystems Over F2155. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:804-813 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002