Li Gong Increasing Availability and Security of an Authentication Service. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:657-662 [Journal]
Robert M. Gagliardi LPI in Pulsed Laser Space Communications. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:673-678 [Journal]
Colin Boyd Security Architectures Using Formal Methods. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:694-701 [Journal]
Marie-Jeanne Toussaint A New Method for Analyzing the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:702-714 [Journal]
Yuliang Zheng, Jennifer Seberry Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal]
Chin-Chen Chang, Horng-Chin Lee A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:725-729 [Journal]
Chyan Yang, Chien-Chao Tsai Managing Secure Communications With Multilevel Security and Restricted Character Set Translation. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:745-756 [Journal]
Lein Harn, Shoubao Yang ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:757-760 [Journal]
Benjamin Arazi Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:761-769 [Journal]