au.\*:("Davida, George")
Results 1 to 25 of 96
Selection :
Plausible deniability using automated linguistic stegonagraphyCHAPMAN, Mark; DAVIDA, George.Lecture notes in computer science. 2002, pp 276-287, issn 0302-9743, isbn 3-540-44309-6, 12 p.Conference Paper
Information security (Malaga, 1-3 October 2001)Davida, George I; Frankel, Yair.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42662-0, XIII, 554 p, isbn 3-540-42662-0Conference Proceedings
A practical and effective approach to large-scale automated linguistic steganographyCHAPMAN, Mark; DAVIDA, George I; RENNHARD, Marc et al.Lecture notes in computer science. 2001, pp 156-165, issn 0302-9743, isbn 3-540-42662-0Conference Paper
Fingerprinting text in logical markup languagesJENSEN, Christian D.Lecture notes in computer science. 2001, pp 433-445, issn 0302-9743, isbn 3-540-42662-0Conference Paper
An incremental payment method for internet based streaming real-time mediaFUCHSBERGER, A.Lecture notes in computer science. 1998, pp 321-327, issn 0302-9743, isbn 3-540-64382-6Conference Paper
On rough sets and inference analysisKAN ZHANG.Lecture notes in computer science. 1998, pp 256-265, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Virtual software tokens: A practical way to secure PKI roamingKWON, Taekyoung.Lecture notes in computer science. 2002, pp 288-302, issn 0302-9743, isbn 3-540-44309-6, 15 p.Conference Paper
Information security (Ishikawa, 17-19 September 1997)Okamoto, Eiji; Davida, George; Mambo, Masahiro et al.Lecture notes in computer science. 1998, issn 0302-9743, isbn 3-540-64382-6, XII, 356 p, isbn 3-540-64382-6Conference Proceedings
Signcryption and its applications in efficient public key solutionsZHENG, Y.Lecture notes in computer science. 1998, pp 291-312, issn 0302-9743, isbn 3-540-64382-6Conference Paper
How to buy better testing: Using competition to get the most security and robustness for your dollarSCHECHTER, Stuart.Lecture notes in computer science. 2002, pp 73-87, issn 0302-9743, isbn 3-540-44309-6, 15 p.Conference Paper
Denial of access in biometrics-based authentication systemsRILA, Luciano.Lecture notes in computer science. 2002, pp 19-29, issn 0302-9743, isbn 3-540-44309-6, 11 p.Conference Paper
Pseudonymizing Unix log filesFLEGEL, Ulrich.Lecture notes in computer science. 2002, pp 162-179, issn 0302-9743, isbn 3-540-44309-6, 18 p.Conference Paper
Securing elliptic curve point multiplication against side-channel attacksMÖLLER, Bodo.Lecture notes in computer science. 2001, pp 324-334, issn 0302-9743, isbn 3-540-42662-0Conference Paper
Practice-oriented provable-securityBELLARE, M.Lecture notes in computer science. 1998, pp 221-231, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Remarks on blind decryptionOHTA, K.Lecture notes in computer science. 1998, pp 109-115, issn 0302-9743, isbn 3-540-64382-6Conference Paper
The case for a secure multi-application smart card operating systemMARKANTONAKIS, C.Lecture notes in computer science. 1998, pp 188-197, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Cryptanalysis of Message authentication CodesPRENEEL, B.Lecture notes in computer science. 1998, pp 55-65, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Threshold proxy signature schemesKAN ZHANG.Lecture notes in computer science. 1998, pp 282-290, issn 0302-9743, isbn 3-540-64382-6Conference Paper
InfraSec 2002 : infrastructure security (Bristol, 1-3 october 2002)Davida, George; Frankel, Yair; Rees, Owen et al.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-44309-6, XI, 337 p, isbn 3-540-44309-6Conference Proceedings
A key escrow system of the RSA cryptosystemSAMESHIMA, Y.Lecture notes in computer science. 1998, pp 135-146, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Some recent research aspects of threshold cryptographyDESMEDT, Y.Lecture notes in computer science. 1998, pp 158-173, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Single sign-on architecturesDE CLERCQ, Jan.Lecture notes in computer science. 2002, pp 40-58, issn 0302-9743, isbn 3-540-44309-6, 19 p.Conference Paper
Division in logspace-uniform NCCHIU, Andrew; DAVIDA, George; LITOW, Bruce et al.Theoretical informatics and applications. 2001, Vol 35, Num 3, pp 259-276Article
Fast arithmetics using Chinese remainderingDAVIDA, George; LITOW, Bruce; GUANGWU XU et al.Information processing letters. 2009, Vol 109, Num 13, pp 660-662, issn 0020-0190, 3 p.Article
Suitability of a classical analysis method for E-commerce protocolsGÜRGENS, Sigrid; LOPEZ, Javier.Lecture notes in computer science. 2001, pp 46-62, issn 0302-9743, isbn 3-540-42662-0Conference Paper