The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Whitfield Diffie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Whitfield Diffie
    Cryptography, the Next Two Decades. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:84-108 [Conf]
  2. Whitfield Diffie
    Security for the DoD Transmission Control Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:108-127 [Conf]
  3. Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith
    National Security and Commercial Security: Division of Responsibility. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:154-156 [Conf]
  4. Harriet J. Fell, Whitfield Diffie
    Analysis of a Public Key Approach Based on Polynomial Substitution. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:340-349 [Conf]
  5. D. G. Steer, L. Strawczynski, Whitfield Diffie, Michael J. Wiener
    A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:520-528 [Conf]
  6. Whitfield Diffie
    The Adolescence of Public-Key Cryptography (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:2- [Conf]
  7. Whitfield Diffie
    Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:136-138 [Conf]
  8. Whitfield Diffie
    Ultimate cryptography. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:3, pp:84-86 [Journal]
  9. Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
    Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal]
  10. Thomas Beth, Whitfield Diffie
    Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:7-9 [Journal]
  11. Whitfield Diffie
    The National Security Establishment and the Development of Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:9-12 [Journal]
  12. Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener
    Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal]
  13. Whitfield Diffie
    Chattering about SIGINT. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:9- [Journal]
  14. Whitfield Diffie
    E-commerce and security. [Citation Graph (0, 0)][DBLP]
    ACM StandardView, 1998, v:6, n:3, pp:116-117 [Journal]
  15. Whitfield Diffie
    Cryptography: Past, Present and Future. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1529-1530 [Conf]

  16. Multiuser cryptographic techniques. [Citation Graph (, )][DBLP]


  17. Internal surveillance, external risks. [Citation Graph (, )][DBLP]


  18. Information security: 50 years behind, 50 years ahead. [Citation Graph (, )][DBLP]


  19. Communications surveillance: privacy and security at risk. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002