|
Search the dblp DataBase
George I. Davida:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells
Database Security. [Citation Graph (9, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:6, pp:531-533 [Journal]
- George I. Davida, David L. Wells, John B. Kam
A Database Encryption System with Subkeys. [Citation Graph (2, 5)][DBLP] ACM Trans. Database Syst., 1981, v:6, n:2, pp:312-328 [Journal]
- John B. Kam, George I. Davida
Structured Design of Substitution-Permutation Encryption Networks. [Citation Graph (1, 0)][DBLP] IEEE Trans. Computers, 1979, v:28, n:10, pp:747-753 [Journal]
- Bruce E. Litow, George I. Davida
O(log(n)) Parallel Time Finite Field Inversion. [Citation Graph (0, 0)][DBLP] AWOC, 1988, pp:74-80 [Conf]
- George I. Davida, Jon Livesey
Disability Independent Computer Systems for the Handicapped. [Citation Graph (0, 0)][DBLP] COMPCON, 1984, pp:345-352 [Conf]
- George I. Davida, Frank B. Dancs
A Crypto-Engine. [Citation Graph (0, 0)][DBLP] CRYPTO, 1987, pp:257-268 [Conf]
- George I. Davida, Brian J. Matt
Arbitration in Tamper Proof Systems. [Citation Graph (0, 0)][DBLP] CRYPTO, 1987, pp:216-222 [Conf]
- George I. Davida, Yvo Desmedt
Passports and Visas Versus IDS (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:183-188 [Conf]
- George I. Davida, Yvo Desmedt, René Peralta
A Key Distribution System Based On Any One-Way Function (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:75-79 [Conf]
- George I. Davida, Yvo Desmedt, René Peralta
On the Importance of Memory Resources in the Security of Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:11-15 [Conf]
- George I. Davida, Gilbert G. Walter
A Public Key Analog Cryptosystem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1987, pp:143-147 [Conf]
- George I. Davida, Yi-Shiung Yeh
Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1986, pp:50- [Conf]
- George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung
Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:1-16 [Conf]
- George I. Davida, Richard A. DeMillo, Richard J. Lipton
Multilevel Secure Distributed System. [Citation Graph (0, 0)][DBLP] ICDCS, 1981, pp:308-312 [Conf]
- George I. Davida, Jeremy A. Hansen
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:364-367 [Conf]
- George I. Davida, Jon Peccarelli
Hardening windows systems. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:368-371 [Conf]
- Mark Chapman, George I. Davida
Hiding the Hidden: A software system for concealing ciphertext as innocuous text. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:335-345 [Conf]
- George I. Davida, Yair Frankel
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 1999, pp:104-113 [Conf]
- Mark Chapman, George I. Davida
Plausible Deniability Using Automated Linguistic Stegonagraphy. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:276-287 [Conf]
- Mark Chapman, George I. Davida, Marc Rennhard
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:156-165 [Conf]
- George I. Davida, René Peralta
High-Speed Cryptography. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:116-120 [Conf]
- George I. Davida, Richard A. DeMillo, Richard J. Lipton
Protecting Shared Cryptographic Keys. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:100-102 [Conf]
- George I. Davida, Richard A. DeMillo, Richard J. Lipton
A System Architecture to Support a Verifiably Secure Multilevel Security System. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:137-144 [Conf]
- George I. Davida, Yvo Desmedt, Brian J. Matt
Defending Systems against Viruses through Cryptographic Authentication. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:312-318 [Conf]
- George I. Davida
Security and Privacy. [Citation Graph (0, 0)][DBLP] VLDB, 1978, pp:54- [Conf]
- George I. Davida
Privacy, Security and Databases: Any Solutions? [Citation Graph (0, 0)][DBLP] VLDB Surveys, 1978, pp:249-251 [Conf]
- George I. Davida, Yvo Desmedt
Cryptography Based Data Security. [Citation Graph (0, 0)][DBLP] Advances in Computers, 1990, v:30, n:, pp:171-222 [Journal]
- George I. Davida, Yvo Desmedt
Passports and visas versus IDs. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:3, pp:253-258 [Journal]
- George I. Davida, Sudhakar M. Reddy
Forward-Error Correction with Decision Feedback [Citation Graph (0, 0)][DBLP] Information and Control, 1972, v:21, n:2, pp:117-133 [Journal]
- Sudhakar M. Reddy, George I. Davida, John P. Robinson
A Class of High-Rate Double-Error-Correcting Convolutional Codes [Citation Graph (0, 0)][DBLP] Information and Control, 1970, v:16, n:3, pp:225-230 [Journal]
- Andrew Chiu, George I. Davida, Bruce E. Litow
Division in logspace-uniform NC1. [Citation Graph (0, 0)][DBLP] ITA, 2001, v:35, n:3, pp:259-275 [Journal]
- George I. Davida, Bruce E. Litow
Fast Parallel Arithmetic via Modular Representation. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1991, v:20, n:4, pp:756-765 [Journal]
On Enabling Secure Applications Through Off-Line Biometric Identification. [Citation Graph (, )][DBLP]
Fast Arithmetics Using Chinese Remaindering [Citation Graph (, )][DBLP]
Search in 0.018secs, Finished in 0.020secs
|