Search the dblp DataBase
Stephen M. Matyas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stephen M. Matyas , Allen Roginsky An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:155-160 [Conf ] Don Coppersmith , Rosario Gennaro , Shai Halevi , Charanjit S. Jutla , Stephen M. Matyas , Mohammad Peyravian , David Safford , Nevenko Zunic IBM Comments. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:333-336 [Conf ] Donald B. Johnson , Stephen M. Matyas , An V. Le , John D. Wilkins Design of the Commercial Data Masking Facility Data Privacy Algorithm. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:93-96 [Conf ] Albert C. Leighton , Stephen M. Matyas The History of Book Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:101-113 [Conf ] Stephen M. Matyas Public-Key Registration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:451-458 [Conf ] Richard E. Lennon , Stephen M. Matyas Cryptographic Key Verification. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1983, pp:265-269 [Conf ] Robert R. Jueneman , Stephen M. Matyas , Carl H. Meyer Message Authentication with Manipulation Detection Code. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:33-54 [Conf ] Stephen M. Matyas Digital Signatures - An Overview. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1979, v:3, n:, pp:87-94 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Nevenko Zunic Decentralized group key management for secure multicast communications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:13, pp:1183-1187 [Journal ] Sarbari Gupta , Stephen M. Matyas Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:56-68 [Journal ] Rosario Gennaro , Paul A. Karger , Stephen M. Matyas , Mohammad Peyravian , Allen Roginsky , David Safford , Michael Willett , Nevenko Zunic Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal ] John Kennedy , Stephen M. Matyas , Nevenko Zunic Key Recovery Functional Model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:31-36 [Journal ] Abby Maclean , Stephen M. Matyas , Nevenko Zunic Organization Implementation Guidelines for Recovery of Encrypted Information. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:69-81 [Journal ] Stephen M. Matyas , Jeff Stapleto A Biometric Standard for Information Management and Security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:5, pp:428-441 [Journal ] Stephen M. Matyas , Nevenko Zunic Additional Key Recovery Function. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:37-40 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal ] Chuck Williams , Nevenko Zunic , Stephen M. Matyas , Sarbari Gupta , Michael Willett Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal ] William R. Ehrsam , Stephen M. Matyas , Carl H. Meyer , Walter L. Tuchman A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1978, v:17, n:2, pp:106-125 [Journal ] Donald B. Johnson , George M. Dolan , Michael J. Kelly , An V. Le , Stephen M. Matyas Common Cryptographic Architecture Cryptographic Application Programming Interface. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1991, v:30, n:2, pp:130-150 [Journal ] An V. Le , Stephen M. Matyas , Donald B. Johnson , John D. Wilkins A Public Key Extension to the Common Cryptographic Architecture. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1993, v:32, n:3, pp:461-485 [Journal ] Dennis Longley , Stephen M. Matyas Complementarity Attacks and Control Vectors. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1993, v:32, n:2, pp:321-325 [Journal ] Stephen M. Matyas Key Handling with Control Vectors. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1991, v:30, n:2, pp:151-174 [Journal ] Stephen M. Matyas , An V. Le , Dennis G. Abraham A Key-Management Scheme Based on Control Vectors. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1991, v:30, n:2, pp:175-191 [Journal ] Stephen M. Matyas , Carl H. Meyer Generation, Distribution, and Installation of Cryptographic Keys. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1978, v:17, n:2, pp:126-137 [Journal ] Stephen M. Matyas Key Processing with Control Vectors. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:3, n:2, pp:113-136 [Journal ] James P. Gray , Ajay D. Kshemkalyani , Stephen M. Matyas , Mohammad Peyravian , Gene Tsudik ATM cell encryption and key update synchronization. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 1997, v:7, n:4, pp:391-408 [Journal ] Search in 0.002secs, Finished in 0.302secs