A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms. | 0 | 0.34 | 2007 |
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms | 2 | 0.38 | 2005 |
Plausible Deniability Using Automated Linguistic Stegonagraphy | 15 | 1.26 | 2002 |
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings | 21 | 2.98 | 2002 |
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings | 33 | 4.87 | 2001 |
Division in logspace-uniform NC1 | 60 | 2.32 | 2001 |
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography | 33 | 2.72 | 2001 |
On Enabling Secure Applications Through Off-Line Biometric Identification. | 168 | 28.62 | 1998 |
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings | 30 | 5.82 | 1998 |
Hiding the Hidden: A software system for concealing ciphertext as innocuous text | 69 | 6.46 | 1997 |
High-Speed Cryptography | 2 | 0.41 | 1997 |
Anonymity Control in E-Cash Systems | 54 | 3.08 | 1997 |
Passports and visas versus IDs | 4 | 0.84 | 1992 |
Fast parallel arithmetic via modular representation | 20 | 1.75 | 1991 |
Cryptography Based Data Security | 0 | 0.34 | 1990 |
On The Importance Of Memory Resources In The Security Of Key Exchange Protocols | 1 | 0.34 | 1990 |
Defending systems against viruses through cryptographic authentication | 9 | 4.19 | 1989 |
A key distribution system based on any one-way function (extended abstract) | 1 | 0.59 | 1989 |
Passports and Visas Versus IDS (Extended Abstract) | 0 | 0.34 | 1988 |
Arbitration in Tamper Proof Systems | 4 | 2.46 | 1987 |
A public key analog cryptosystem | 0 | 0.34 | 1987 |
Multilevel Cryptosecure Relational Database | 0 | 0.34 | 1986 |
Disability Independent Computer Systems for the Handicapped | 0 | 0.34 | 1984 |
Cryptographic Relational Algebra. | 4 | 0.61 | 1982 |
Report of the public cryptography study group | 5 | 1.33 | 1981 |
Multilevel Secure Distributed System | 0 | 0.34 | 1981 |
The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture. | 0 | 0.34 | 1981 |
A database encryption system with subkeys | 65 | 20.28 | 1981 |
Protecting Shared Cryptographic Keys. | 13 | 3.91 | 1980 |
A System Architecture to Support a Verifiably Secure Multilevel Security System | 7 | 7.47 | 1980 |
Security and Privacy. | 0 | 0.34 | 1978 |
Security and privacy | 1 | 0.35 | 1978 |
Programs in software engineering education | 0 | 0.34 | 1978 |
Privacy, Security and Databases: Any Solutions? | 0 | 0.34 | 1978 |
Optimum Featurs and Graph Isomorphism. | 2 | 1.13 | 1974 |
Forward-Error Correction with Decision Feedback | 7 | 13.16 | 1972 |
A Class of High-Rate Double-Error-Correcting Convolutional Codes | 0 | 0.34 | 1970 |