The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nevenko Zunic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  2. Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic
    Decentralized group key management for secure multicast communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:13, pp:1183-1187 [Journal]
  3. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  4. John Kennedy, Stephen M. Matyas, Nevenko Zunic
    Key Recovery Functional Model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:31-36 [Journal]
  5. Abby Maclean, Stephen M. Matyas, Nevenko Zunic
    Organization Implementation Guidelines for Recovery of Encrypted Information. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:69-81 [Journal]
  6. Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal]
  7. Stephen M. Matyas, Nevenko Zunic
    Additional Key Recovery Function. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:37-40 [Journal]
  8. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
  9. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
  10. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
  11. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
  12. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
  13. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Methods for preventing unauthorized software distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:316-321 [Journal]
  14. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
  15. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Hash-based encryption system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal]
  16. Mohammad Peyravian, Nevenko Zunic
    Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:466-469 [Journal]
  17. Chuck Williams, Nevenko Zunic
    Global Interoperability for Key Recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:48-55 [Journal]
  18. Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
    Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
  19. Nevenko Zunic
    Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:82-85 [Journal]

Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002