The SCEAS System
Navigation Menu

Search the dblp DataBase


George I. Davida: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells
    Database Security. [Citation Graph (9, 0)][DBLP]
    IEEE Trans. Software Eng., 1978, v:4, n:6, pp:531-533 [Journal]
  2. George I. Davida, David L. Wells, John B. Kam
    A Database Encryption System with Subkeys. [Citation Graph (2, 5)][DBLP]
    ACM Trans. Database Syst., 1981, v:6, n:2, pp:312-328 [Journal]
  3. John B. Kam, George I. Davida
    Structured Design of Substitution-Permutation Encryption Networks. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Computers, 1979, v:28, n:10, pp:747-753 [Journal]
  4. Bruce E. Litow, George I. Davida
    O(log(n)) Parallel Time Finite Field Inversion. [Citation Graph (0, 0)][DBLP]
    AWOC, 1988, pp:74-80 [Conf]
  5. George I. Davida, Jon Livesey
    Disability Independent Computer Systems for the Handicapped. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1984, pp:345-352 [Conf]
  6. George I. Davida, Frank B. Dancs
    A Crypto-Engine. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:257-268 [Conf]
  7. George I. Davida, Brian J. Matt
    Arbitration in Tamper Proof Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:216-222 [Conf]
  8. George I. Davida, Yvo Desmedt
    Passports and Visas Versus IDS (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:183-188 [Conf]
  9. George I. Davida, Yvo Desmedt, René Peralta
    A Key Distribution System Based On Any One-Way Function (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:75-79 [Conf]
  10. George I. Davida, Yvo Desmedt, René Peralta
    On the Importance of Memory Resources in the Security of Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:11-15 [Conf]
  11. George I. Davida, Gilbert G. Walter
    A Public Key Analog Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:143-147 [Conf]
  12. George I. Davida, Yi-Shiung Yeh
    Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:50- [Conf]
  13. George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung
    Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:1-16 [Conf]
  14. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    Multilevel Secure Distributed System. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1981, pp:308-312 [Conf]
  15. George I. Davida, Jeremy A. Hansen
    A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:364-367 [Conf]
  16. George I. Davida, Jon Peccarelli
    Hardening windows systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:368-371 [Conf]
  17. Mark Chapman, George I. Davida
    Hiding the Hidden: A software system for concealing ciphertext as innocuous text. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:335-345 [Conf]
  18. George I. Davida, Yair Frankel
    Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:104-113 [Conf]
  19. Mark Chapman, George I. Davida
    Plausible Deniability Using Automated Linguistic Stegonagraphy. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:276-287 [Conf]
  20. Mark Chapman, George I. Davida, Marc Rennhard
    A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:156-165 [Conf]
  21. George I. Davida, René Peralta
    High-Speed Cryptography. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:116-120 [Conf]
  22. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    Protecting Shared Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:100-102 [Conf]
  23. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    A System Architecture to Support a Verifiably Secure Multilevel Security System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:137-144 [Conf]
  24. George I. Davida, Yvo Desmedt, Brian J. Matt
    Defending Systems against Viruses through Cryptographic Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:312-318 [Conf]
  25. George I. Davida
    Security and Privacy. [Citation Graph (0, 0)][DBLP]
    VLDB, 1978, pp:54- [Conf]
  26. George I. Davida
    Privacy, Security and Databases: Any Solutions? [Citation Graph (0, 0)][DBLP]
    VLDB Surveys, 1978, pp:249-251 [Conf]
  27. George I. Davida, Yvo Desmedt
    Cryptography Based Data Security. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 1990, v:30, n:, pp:171-222 [Journal]
  28. George I. Davida, Yvo Desmedt
    Passports and visas versus IDs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:253-258 [Journal]
  29. George I. Davida, Sudhakar M. Reddy
    Forward-Error Correction with Decision Feedback [Citation Graph (0, 0)][DBLP]
    Information and Control, 1972, v:21, n:2, pp:117-133 [Journal]
  30. Sudhakar M. Reddy, George I. Davida, John P. Robinson
    A Class of High-Rate Double-Error-Correcting Convolutional Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1970, v:16, n:3, pp:225-230 [Journal]
  31. Andrew Chiu, George I. Davida, Bruce E. Litow
    Division in logspace-uniform NC1. [Citation Graph (0, 0)][DBLP]
    ITA, 2001, v:35, n:3, pp:259-275 [Journal]
  32. George I. Davida, Bruce E. Litow
    Fast Parallel Arithmetic via Modular Representation. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1991, v:20, n:4, pp:756-765 [Journal]

  33. On Enabling Secure Applications Through Off-Line Biometric Identification. [Citation Graph (, )][DBLP]

  34. Fast Arithmetics Using Chinese Remaindering [Citation Graph (, )][DBLP]

Search in 0.017secs, Finished in 0.018secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002