|
Search the dblp DataBase
David Safford:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
IBM Comments. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:333-336 [Conf]
- Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
- Sean W. Smith, David Safford
Practical server privacy with secure coprocessors. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 2001, v:40, n:3, pp:683-695 [Journal]
- Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford
Autonomic 802.11 Wireless LAN Security Auditing. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:56-65 [Journal]
Search in 0.028secs, Finished in 0.028secs
|