AAAAAA

   
Results: 1-8 |
Results: 8

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Methods for timestamping electronic documents using certificates and user-specified times, COMPUT SEC, 20(3), 2001, pp. 255-262

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Alternative method for unique RSA primes generation, COMPUT SEC, 20(2), 2001, pp. 173-179

Authors: Kovalev, S Roginsky, A Daniel, A Zhemkova, E Orlov, G Bonner, E Samodurov, J Ponomarev, L Gannushkina, S Bogoraz, L Aleexeva, L Malikova, V Rybakov, Y Yushenkov, S Goryacheva, Y Kyklina, I Melnikova, V Yakunin, G
Citation: S. Kovalev et al., On the consequences of terrorist acts in the US - An appeal by Russian human rights organizations, NY REV BOOK, 48(17), 2001, pp. 73-73

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Ticket and challenge-based protocols for timestamping, COMPUT SEC, 19(6), 2000, pp. 551-558

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Multiparty biometric-based authentication, COMPUT SEC, 19(4), 2000, pp. 369-374

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Generation of RSA keys that are guaranteed to be unique for each user, COMPUT SEC, 19(3), 2000, pp. 282-288

Authors: Peyravian, M Matyas, SM Roginsky, A Zunic, N
Citation: M. Peyravian et al., Generating user-based cryptographic keys and random numbers, COMPUT SEC, 18(7), 1999, pp. 619-626

Authors: Peyravian, M Roginsky, A Zunic, N
Citation: M. Peyravian et al., Hash-based encryption system, COMPUT SEC, 18(4), 1999, pp. 345-350
Risultati: 1-8 |