|
Search the dblp DataBase
Nevenko Zunic:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
IBM Comments. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:333-336 [Conf]
- Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic
Decentralized group key management for secure multicast communications. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:13, pp:1183-1187 [Journal]
- Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
- John Kennedy, Stephen M. Matyas, Nevenko Zunic
Key Recovery Functional Model. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:31-36 [Journal]
- Abby Maclean, Stephen M. Matyas, Nevenko Zunic
Organization Implementation Guidelines for Recovery of Encrypted Information. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:69-81 [Journal]
- Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal]
- Stephen M. Matyas, Nevenko Zunic
Additional Key Recovery Function. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:37-40 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Methods for preventing unauthorized software distribution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:4, pp:316-321 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Hash-based encryption system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal]
- Mohammad Peyravian, Nevenko Zunic
Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:466-469 [Journal]
- Chuck Williams, Nevenko Zunic
Global Interoperability for Key Recovery. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:48-55 [Journal]
- Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
- Nevenko Zunic
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:82-85 [Journal]
Search in 0.004secs, Finished in 0.006secs
|