Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Davida, George")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 96

  • Page / 4
Export

Selection :

  • and

Plausible deniability using automated linguistic stegonagraphyCHAPMAN, Mark; DAVIDA, George.Lecture notes in computer science. 2002, pp 276-287, issn 0302-9743, isbn 3-540-44309-6, 12 p.Conference Paper

Information security (Malaga, 1-3 October 2001)Davida, George I; Frankel, Yair.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42662-0, XIII, 554 p, isbn 3-540-42662-0Conference Proceedings

A practical and effective approach to large-scale automated linguistic steganographyCHAPMAN, Mark; DAVIDA, George I; RENNHARD, Marc et al.Lecture notes in computer science. 2001, pp 156-165, issn 0302-9743, isbn 3-540-42662-0Conference Paper

Fingerprinting text in logical markup languagesJENSEN, Christian D.Lecture notes in computer science. 2001, pp 433-445, issn 0302-9743, isbn 3-540-42662-0Conference Paper

An incremental payment method for internet based streaming real-time mediaFUCHSBERGER, A.Lecture notes in computer science. 1998, pp 321-327, issn 0302-9743, isbn 3-540-64382-6Conference Paper

On rough sets and inference analysisKAN ZHANG.Lecture notes in computer science. 1998, pp 256-265, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Virtual software tokens: A practical way to secure PKI roamingKWON, Taekyoung.Lecture notes in computer science. 2002, pp 288-302, issn 0302-9743, isbn 3-540-44309-6, 15 p.Conference Paper

Information security (Ishikawa, 17-19 September 1997)Okamoto, Eiji; Davida, George; Mambo, Masahiro et al.Lecture notes in computer science. 1998, issn 0302-9743, isbn 3-540-64382-6, XII, 356 p, isbn 3-540-64382-6Conference Proceedings

Signcryption and its applications in efficient public key solutionsZHENG, Y.Lecture notes in computer science. 1998, pp 291-312, issn 0302-9743, isbn 3-540-64382-6Conference Paper

How to buy better testing: Using competition to get the most security and robustness for your dollarSCHECHTER, Stuart.Lecture notes in computer science. 2002, pp 73-87, issn 0302-9743, isbn 3-540-44309-6, 15 p.Conference Paper

Denial of access in biometrics-based authentication systemsRILA, Luciano.Lecture notes in computer science. 2002, pp 19-29, issn 0302-9743, isbn 3-540-44309-6, 11 p.Conference Paper

Pseudonymizing Unix log filesFLEGEL, Ulrich.Lecture notes in computer science. 2002, pp 162-179, issn 0302-9743, isbn 3-540-44309-6, 18 p.Conference Paper

Securing elliptic curve point multiplication against side-channel attacksMÖLLER, Bodo.Lecture notes in computer science. 2001, pp 324-334, issn 0302-9743, isbn 3-540-42662-0Conference Paper

Practice-oriented provable-securityBELLARE, M.Lecture notes in computer science. 1998, pp 221-231, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Remarks on blind decryptionOHTA, K.Lecture notes in computer science. 1998, pp 109-115, issn 0302-9743, isbn 3-540-64382-6Conference Paper

The case for a secure multi-application smart card operating systemMARKANTONAKIS, C.Lecture notes in computer science. 1998, pp 188-197, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Cryptanalysis of Message authentication CodesPRENEEL, B.Lecture notes in computer science. 1998, pp 55-65, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Threshold proxy signature schemesKAN ZHANG.Lecture notes in computer science. 1998, pp 282-290, issn 0302-9743, isbn 3-540-64382-6Conference Paper

InfraSec 2002 : infrastructure security (Bristol, 1-3 october 2002)Davida, George; Frankel, Yair; Rees, Owen et al.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-44309-6, XI, 337 p, isbn 3-540-44309-6Conference Proceedings

A key escrow system of the RSA cryptosystemSAMESHIMA, Y.Lecture notes in computer science. 1998, pp 135-146, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Some recent research aspects of threshold cryptographyDESMEDT, Y.Lecture notes in computer science. 1998, pp 158-173, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Single sign-on architecturesDE CLERCQ, Jan.Lecture notes in computer science. 2002, pp 40-58, issn 0302-9743, isbn 3-540-44309-6, 19 p.Conference Paper

Division in logspace-uniform NCCHIU, Andrew; DAVIDA, George; LITOW, Bruce et al.Theoretical informatics and applications. 2001, Vol 35, Num 3, pp 259-276Article

Fast arithmetics using Chinese remainderingDAVIDA, George; LITOW, Bruce; GUANGWU XU et al.Information processing letters. 2009, Vol 109, Num 13, pp 660-662, issn 0020-0190, 3 p.Article

Suitability of a classical analysis method for E-commerce protocolsGÜRGENS, Sigrid; LOPEZ, Javier.Lecture notes in computer science. 2001, pp 46-62, issn 0302-9743, isbn 3-540-42662-0Conference Paper

  • Page / 4