Computing Partitions with Applications to the Knapsack Problem
Journal of the ACM (JACM)
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Time Sharing Computer Systems
Security, Accuracy, and Privacy in Computer Systems
Security, Accuracy, and Privacy in Computer Systems
Shift Register Sequences
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Cryptanalysis a Study of Ciphers and Their Solutions
Cryptanalysis a Study of Ciphers and Their Solutions
Initializing generalized feedback shift register pseudorandom number generators
Journal of the ACM (JACM)
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
Symmetric Public-Key Encryption
CRYPTO '85 Advances in Cryptology
A review of information security issues and respective research contributions
ACM SIGMIS Database
Networking aspects for the security of game input
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Practical secure electronic mail system with public key distribution
Computer Communications
N-ary tree based key distribution in a network as a service provisioning model
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |