Search the dblp DataBase
Whitfield Diffie :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Whitfield Diffie Cryptography, the Next Two Decades. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1981, pp:84-108 [Conf ] Whitfield Diffie Security for the DoD Transmission Control Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:108-127 [Conf ] Whitfield Diffie , Melville Klein , Michael L. Dertouzos , Andrew Gleason , Dean Smith National Security and Commercial Security: Division of Responsibility. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1981, pp:154-156 [Conf ] Harriet J. Fell , Whitfield Diffie Analysis of a Public Key Approach Based on Polynomial Substitution. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:340-349 [Conf ] D. G. Steer , L. Strawczynski , Whitfield Diffie , Michael J. Wiener A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:520-528 [Conf ] Whitfield Diffie The Adolescence of Public-Key Cryptography (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:2- [Conf ] Whitfield Diffie Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:136-138 [Conf ] Whitfield Diffie Ultimate cryptography. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:3, pp:84-86 [Journal ] Susan Landau , Stephen T. Kent , Clint Brooks , Scott Charney , Dorothy E. Denning , Whitfield Diffie , Anthony Lauck , Douglas Miller , Peter G. Neumann , David Sobel Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal ] Thomas Beth , Whitfield Diffie Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:7-9 [Journal ] Whitfield Diffie The National Security Establishment and the Development of Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:9-12 [Journal ] Whitfield Diffie , Paul C. van Oorschot , Michael J. Wiener Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal ] Whitfield Diffie Chattering about SIGINT. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:9- [Journal ] Whitfield Diffie E-commerce and security. [Citation Graph (0, 0)][DBLP ] ACM StandardView, 1998, v:6, n:3, pp:116-117 [Journal ] Whitfield Diffie Cryptography: Past, Present and Future. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1529-1530 [Conf ] Multiuser cryptographic techniques. [Citation Graph (, )][DBLP ] Internal surveillance, external risks. [Citation Graph (, )][DBLP ] Information security: 50 years behind, 50 years ahead. [Citation Graph (, )][DBLP ] Communications surveillance: privacy and security at risk. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs