The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Safford: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  2. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  3. Sean W. Smith, David Safford
    Practical server privacy with secure coprocessors. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:3, pp:683-695 [Journal]
  4. Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford
    Autonomic 802.11 Wireless LAN Security Auditing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:56-65 [Journal]

Search in 0.028secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002