Name
Papers
Collaborators
GEORGE I. DAVIDA
37
39
Citations 
PageRank 
Referers 
630
121.38
1145
Referees 
References 
266
207
Search Limit
1001000
Title
Citations
PageRank
Year
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms.00.342007
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms20.382005
Plausible Deniability Using Automated Linguistic Stegonagraphy151.262002
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings212.982002
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings334.872001
Division in logspace-uniform NC1602.322001
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography332.722001
On Enabling Secure Applications Through Off-Line Biometric Identification.16828.621998
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings305.821998
Hiding the Hidden: A software system for concealing ciphertext as innocuous text696.461997
High-Speed Cryptography20.411997
Anonymity Control in E-Cash Systems543.081997
Passports and visas versus IDs40.841992
Fast parallel arithmetic via modular representation201.751991
Cryptography Based Data Security00.341990
On The Importance Of Memory Resources In The Security Of Key Exchange Protocols10.341990
Defending systems against viruses through cryptographic authentication94.191989
A key distribution system based on any one-way function (extended abstract)10.591989
Passports and Visas Versus IDS (Extended Abstract)00.341988
Arbitration in Tamper Proof Systems42.461987
A public key analog cryptosystem00.341987
Multilevel Cryptosecure Relational Database00.341986
Disability Independent Computer Systems for the Handicapped00.341984
Cryptographic Relational Algebra.40.611982
Report of the public cryptography study group51.331981
Multilevel Secure Distributed System00.341981
The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture.00.341981
A database encryption system with subkeys6520.281981
Protecting Shared Cryptographic Keys.133.911980
A System Architecture to Support a Verifiably Secure Multilevel Security System77.471980
Security and Privacy.00.341978
Security and privacy10.351978
Programs in software engineering education00.341978
Privacy, Security and Databases: Any Solutions?00.341978
Optimum Featurs and Graph Isomorphism.21.131974
Forward-Error Correction with Decision Feedback713.161972
A Class of High-Rate Double-Error-Correcting Convolutional Codes00.341970