The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Spyros S. Magliveras: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tamás Horváth, Spyros S. Magliveras, Tran van Trung
    A Parallel Permutation Multiplier for a PGM Crypto-chip. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:108-113 [Conf]
  2. Spyros S. Magliveras, Nasir D. Memon
    Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:447-460 [Conf]
  3. Ziya Arnavut, Spyros S. Magliveras
    Block Sorting and Compression. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1997, pp:181-190 [Conf]
  4. Nasir D. Memon, Spyros S. Magliveras, Khalid Sayood
    Prediction Trees and Lossless Image Compression: An Extended Abstract. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1991, pp:83-92 [Conf]
  5. Spyros S. Magliveras, Nasir D. Memon
    Random Permutations from Logarithmic Signatures. [Citation Graph (0, 0)][DBLP]
    Great Lakes Computer Science Conference, 1989, pp:199-205 [Conf]
  6. Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht
    A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos. [Citation Graph (0, 0)][DBLP]
    ICIAR (1), 2006, pp:547-558 [Conf]
  7. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:381-385 [Conf]
  8. Bing Wu, Jie Wu, Eduardo B. Fernández, Spyros S. Magliveras
    Secure and Efficient Key Management in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  9. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    A GCD attack resistant CRTHACS for secure group communications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:153-154 [Conf]
  10. Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth
    Symmetric Block Ciphers Based on Group Bases. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:89-105 [Conf]
  11. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Efficient Key Management for Secure Group Communications with Bursty Behavior. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2002, pp:148-153 [Conf]
  12. Ziya Arnavut, Spyros S. Magliveras
    Lexical Permutation Sorting Algorithm. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1997, v:40, n:5, pp:292-295 [Journal]
  13. Charles A. Cusack, Spyros S. Magliveras
    Semiregular Large Sets. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:18, n:1/3, pp:81-87 [Journal]
  14. Spyros S. Magliveras, Thane E. Plambeck
    New infinite families of simple 5-designs. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1987, v:44, n:1, pp:1-5 [Journal]
  15. Spyros S. Magliveras, Nasir D. Memon
    Algebraic Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:3, pp:167-183 [Journal]
  16. Spyros S. Magliveras, Douglas R. Stinson, Tran van Trung
    New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:4, pp:285-297 [Journal]
  17. Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras
    Lossless Image Compression with a Codebook of Block Scans. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:1, pp:24-30 [Journal]
  18. Earl S. Kramer, Spyros S. Magliveras, Dale M. Mesner
    t-Designs from the large Mathieu groups. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1981, v:36, n:2, pp:171-189 [Journal]
  19. Earl S. Kramer, Spyros S. Magliveras, Rudolf Mathon
    The Steiner systems S(2, 4, 25) with nontrivial automorphism group. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1989, v:77, n:1-3, pp:137-157 [Journal]
  20. Earl S. Kramer, Qiu-Rong Wu, Spyros S. Magliveras, Tran van Trung
    Some perpendicular arrays for arbitrarily large t. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:96, n:2, pp:101-110 [Journal]
  21. Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht
    New approaches to encryption and steganography for digital videos. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2007, v:13, n:3, pp:191-204 [Journal]
  22. Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras
    Secure and efficient key management in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:937-954 [Journal]

  23. Notes on the CRTDH Group Key Agreement Protocol. [Citation Graph (, )][DBLP]


  24. Compression independent object encryption for ensuring privacy in video surveillance. [Citation Graph (, )][DBLP]


  25. Discrete logarithms for finite groups. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002