The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen M. Matyas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen M. Matyas, Allen Roginsky
    An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:155-160 [Conf]
  2. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  3. Donald B. Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins
    Design of the Commercial Data Masking Facility Data Privacy Algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:93-96 [Conf]
  4. Albert C. Leighton, Stephen M. Matyas
    The History of Book Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:101-113 [Conf]
  5. Stephen M. Matyas
    Public-Key Registration. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:451-458 [Conf]
  6. Richard E. Lennon, Stephen M. Matyas
    Cryptographic Key Verification. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1983, pp:265-269 [Conf]
  7. Robert R. Jueneman, Stephen M. Matyas, Carl H. Meyer
    Message Authentication with Manipulation Detection Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:33-54 [Conf]
  8. Stephen M. Matyas
    Digital Signatures - An Overview. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1979, v:3, n:, pp:87-94 [Journal]
  9. Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic
    Decentralized group key management for secure multicast communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:13, pp:1183-1187 [Journal]
  10. Sarbari Gupta, Stephen M. Matyas
    Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:56-68 [Journal]
  11. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  12. John Kennedy, Stephen M. Matyas, Nevenko Zunic
    Key Recovery Functional Model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:31-36 [Journal]
  13. Abby Maclean, Stephen M. Matyas, Nevenko Zunic
    Organization Implementation Guidelines for Recovery of Encrypted Information. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:69-81 [Journal]
  14. Stephen M. Matyas, Jeff Stapleto
    A Biometric Standard for Information Management and Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:428-441 [Journal]
  15. Stephen M. Matyas, Nevenko Zunic
    Additional Key Recovery Function. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:37-40 [Journal]
  16. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
  17. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
  18. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
  19. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
  20. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
  21. Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
    Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
  22. William R. Ehrsam, Stephen M. Matyas, Carl H. Meyer, Walter L. Tuchman
    A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1978, v:17, n:2, pp:106-125 [Journal]
  23. Donald B. Johnson, George M. Dolan, Michael J. Kelly, An V. Le, Stephen M. Matyas
    Common Cryptographic Architecture Cryptographic Application Programming Interface. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1991, v:30, n:2, pp:130-150 [Journal]
  24. An V. Le, Stephen M. Matyas, Donald B. Johnson, John D. Wilkins
    A Public Key Extension to the Common Cryptographic Architecture. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1993, v:32, n:3, pp:461-485 [Journal]
  25. Dennis Longley, Stephen M. Matyas
    Complementarity Attacks and Control Vectors. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1993, v:32, n:2, pp:321-325 [Journal]
  26. Stephen M. Matyas
    Key Handling with Control Vectors. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1991, v:30, n:2, pp:151-174 [Journal]
  27. Stephen M. Matyas, An V. Le, Dennis G. Abraham
    A Key-Management Scheme Based on Control Vectors. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1991, v:30, n:2, pp:175-191 [Journal]
  28. Stephen M. Matyas, Carl H. Meyer
    Generation, Distribution, and Installation of Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1978, v:17, n:2, pp:126-137 [Journal]
  29. Stephen M. Matyas
    Key Processing with Control Vectors. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:3, n:2, pp:113-136 [Journal]
  30. James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik
    ATM cell encryption and key update synchronization. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1997, v:7, n:4, pp:391-408 [Journal]

Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002