Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("CLE SECURITE")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 913

  • Page / 37
Export

Selection :

  • and

PUBLIC KEY VS. CONVENTIONAL KEY ENCRYPTIONKLINE CS; POPEK GJ.1979; NATIONAL COMPUTER CONFERENCE/1979/NEW YORK NY; USA; MONTVALE: AFIPS PRESS; DA. 1979; PP. 831-837; BIBL. 13 REF.Conference Paper

Scalable group rekeying for secure multicast: A surveySENCUN ZHU; SUSHIL JAJODIA.Lecture notes in computer science. 2003, pp 1-10, issn 0302-9743, isbn 3-540-20745-7, 10 p.Conference Paper

DATA SECURITYBRYCE HD.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 2; PP. 159-165Article

NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITYWEGMAN MN; CARTER JL.1981; J. COMPUT. SYST. SCI.; ISSN 0022-0000; USA; DA. 1981; VOL. 22; NO 3; PP. 265-279; BIBL. 14 REF.Article

RECENT. RESULTS IN PUBLIC-KEY CRYPTOGRAPHYWILLETT M.1979; PROC. NATION. ELECTRON. CONF.; USA; DA. 1979; VOL. 33; PP. 322-326; BIBL. 13 REF.Conference Paper

SYMMETRIC AND ASYMMETRIC ENCRYPTIONSIMMONS GJ.1979; COMPUTG SURV.; USA; DA. 1979; VOL. 11; NO 4; PP. 305-330; BIBL. 2 P.Article

THE DESIGN AND OPERATION OF PUBLIC-KEY CRYPTOSYSTEMSMICHELMAN EH.1979; NATIONAL COMPUTER CONFERENCE/1979/NEW YORK NY; USA; MONTVALE: AFIPS PRESS; DA. 1979; PP. 305-311; BIBL. 8 REF.Conference Paper

UGOLNIENIE SZYFROW VIGENERA = GENERALISATION DES CHIFFREURSPIEPRZYK J.1979; ARCH. AUTOMAT. TELEMECH.; POL; DA. 1979; VOL. 24; NO 4; PP. 453-468; ABS. RUS/ENG; BIBL. 11 REF.Article

CRYPTOLOGY IN TRANSITIONLEMPEL A.1979; COMPUTG SURV.; USA; DA. 1979; VOL. 11; NO 4; PP. 285-303; BIBL. 2 P.Article

SAFEGUARDING CRYPTOGRAPHIC KEYSBLAKLEY GR.1979; NATIONAL COMPUTER CONFERENCE/1979/NEW YORK NY; USA; MONTVALE: AFIPS PRESS; DA. 1979; PP. 313-317; BIBL. 5 REF.Conference Paper

SECURE PERSONAL COMPUTING IN AN INSECURE NETWORKDENNING DE.1979; COMMUNIC. A.C.M.; USA; DA. 1979; VOL. 22; NO 8; PP. 476-482; BIBL. 18 REF.Article

GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYSMATYAS SM; MEYER CH.1978; I.B.M. SYST. J.; USA; DA. 1978; VOL. 17; NO 2; PP. 126-137; BIBL. 4 REF.Article

MASTER KEYS FOR GROUP SHARINGDENNING DE; SCHNEIDER FB.1981; INF. PROCESS. LETT.; ISSN 0020-0190; NLD; DA. 1981; VOL. 12; NO 1; PP. 23-25; BIBL. 4 REF.Article

TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLSDENNING DE; SACCO GM.1981; COMMUN. ACM; ISSN 0001-0782; USA; DA. 1981; VOL. 24; NO 8; PP. 533-536; BIBL. 8 REF.Article

A TIME-LUCK TRADEOFF IN RELATIVIZED CRYPTOGRAPHYBRASSARD G.1981; J. COMPUT. SYST. SCI.; ISSN 0022-0000; USA; DA. 1981; VOL. 22; NO 3; PP. 280-311; BIBL. 28 REF.Article

ADDITION TO "THE EXISTENCE OF GOOD CRYPTOSYSTEMS FOR KEY RATES GREATER THAN THE MESSAGE REDUNDANCY"LU SC.1980; I.E.E.E. TRANS. INFORM. THEORY; USA; DA. 1980; VOL. 26; NO 1; PP. 129; BIBL. 2 REF.Article

REPEATED USE OF CODES WICH DETECT DECEPTIONFAK V.1979; IEEE TRANS. INFORM. THEORY; USA; DA. 1979; VOL. 25; NO 2; PP. 233-234; BIBL. 2 REF.Article

RIVEST-SHAMIR-ADLEMAN PUBLIC KEY CRYPTOSYSTEMS DO NOT ALWAYS CONCEAL MESSAGESBLAKLEY GR; BOROSH I.1979; COMPUTERS MATH. APPL.; GBR; DA. 1979; VOL. 5; NO 3; PP. 169-178; BIBL. 6 REF.Article

ON THE POWER OF COMMUTATIVITY IN CRYPTOGRAPHYSHAMIR A.1980; LECTURE NOTES COMPUTER SCI.; DEU; DA. 1980; NO 85; PP. 582-595; BIBL. 10 REF.Conference Paper

HOW TO SHARE A SECRETADI SHAMIR.1979; COMMUNIC. A.C.M.; USA; DA. 1979; VOL. 22; NO 11; PP. 612-613; BIBL. 5 REF.Article

A NOTE ON "MASTER KEYS FOR GROUP SHARING"BROUWER AE; VAN EMDE BOAS P.1982; INF. PROCESS. LETT.; ISSN 0020-0190; NLD; DA. 1982; VOL. 14; NO 1; PP. 12-14; BIBL. 2 REF.Article

A CRYPTOSYSTEM FOR MULTIPLE COMMUNICATIONLUCCIO F; MAZZONE S.1980; INF. PROCESS. LETT.; ISSN 0020-0190; NLD; DA. 1980; VOL. 10; NO 4-5; PP. 180-183; BIBL. 9 REF.Article

SOME REMARKS CONCERNING THE M.I.T. PUBLIC-KEY CRYPTOSYSTEMWILLIAMS HC; SCHMID B.1979; ; BIT; DNK; DA. 1979; VOL. 19; NO 4; PP. 525-538; BIBL. 20 REF.Article

PRZYPADKOWE SZYFRY VIGENERA I ICH ZASTOSOWANIE W SYSTEMACH KOMPUTEROWYCH = CHIFFRAGES ALEATOIRES DE VIGENER ET LEURS APPLICATIONS AUX SYSTEMES INFORMATIQUESPIEPRZYK J.1980; ARCH. AUTOM. TELEMECH.; ISSN 0004-072X; POL; DA. 1980; VOL. 25; NO 2; PP. 237-256; ABS. RUS/ENG; BIBL. 5 REF.Article

A MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDUREWILLIAMS HC.1980; IEEE TRANS. INF. THEORY; ISSN 0018-9448; USA; DA. 1980; VOL. 26; NO 6; PP. 726-729; BIBL. 10 REF.Article

  • Page / 37