AAAAAA

   
Results: 1-13 |
Results: 13

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Methods for timestamping electronic documents using certificates and user-specified times, COMPUT SEC, 20(3), 2001, pp. 255-262

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Alternative method for unique RSA primes generation, COMPUT SEC, 20(2), 2001, pp. 173-179

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Ticket and challenge-based protocols for timestamping, COMPUT SEC, 19(6), 2000, pp. 551-558

Authors: Matyas, SM Stapleton, J
Citation: Sm. Matyas et J. Stapleton, A biometric standard for information management and security, COMPUT SEC, 19(5), 2000, pp. 428-441

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Multiparty biometric-based authentication, COMPUT SEC, 19(4), 2000, pp. 369-374

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Generation of RSA keys that are guaranteed to be unique for each user, COMPUT SEC, 19(3), 2000, pp. 282-288

Authors: Williams, C Zunic, N Matyas, SM Gupta, S Willett, M
Citation: C. Williams et al., Key Recovery Alliance (KRA) technology papers, special issue - Introduction, COMPUT SEC, 19(1), 2000, pp. 18-20

Authors: Kennedy, J Matyas, SM Zunic, N
Citation: J. Kennedy et al., Key recovery functional model, COMPUT SEC, 19(1), 2000, pp. 31-36

Authors: Matyas, SM Zunic, N
Citation: Sm. Matyas et N. Zunic, Additional key recovery functions, COMPUT SEC, 19(1), 2000, pp. 37-40

Authors: Gupta, S Matyas, SM
Citation: S. Gupta et Sm. Matyas, Public key infrastructure: Analysis of existing and needed protocols and object formats for key recovery, COMPUT SEC, 19(1), 2000, pp. 56-68

Authors: Maclean, A Matyas, SM Zunic, N
Citation: A. Maclean et al., Organization implementation guidelines for recovery of encrypted information, COMPUT SEC, 19(1), 2000, pp. 69-81

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Generating user-based cryptographic keys and random numbers, COMPUT SEC, 18(7), 1999, pp. 619-626

Authors: Peyravian, M Matyas, SM Zunic, N
Citation: M. Peyravian et al., Decentralized group key management for secure multicast communications, COMPUT COMM, 22(13), 1999, pp. 1183-1187
Risultati: 1-13 |