George I. Davida

Affiliations:
  • University of Wisconsin-Milwaukee, USA


According to our database1, George I. Davida authored at least 43 papers between 1970 and 2012.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2012
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2009
Fast arithmetics using Chinese remaindering.
Inf. Process. Lett., 2009

2007
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms.
IACR Cryptol. ePrint Arch., 2007

2005
Hardening windows systems.
Proceedings of the ICETE 2005, 2005

A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms.
Proceedings of the ICETE 2005, 2005

2002
Plausible Deniability Using Automated Linguistic Stegonagraphy.
Proceedings of the Infrastructure Security, International Conference, 2002

2001
Division in logspace-uniform <i>NC</i><sup>1</sup>.
RAIRO Theor. Informatics Appl., 2001

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.
Proceedings of the Information Security, 4th International Conference, 2001

1999
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.
Proceedings of the Cryptography and Coding, 1999

1998
On Enabling Secure Applications Through Off-Line Biometric Identification.
Proceedings of the Security and Privacy, 1998

1997
High-Speed Cryptography.
Proceedings of the Information Security, First International Workshop, 1997

Hiding the Hidden: A software system for concealing ciphertext as innocuous text.
Proceedings of the Information and Communication Security, First International Conference, 1997

Anonymity Control in E-Cash Systems.
Proceedings of the Financial Cryptography, 1997

1992
Passports and visas versus IDs.
Comput. Secur., 1992

1991
Fast Parallel Arithmetic via Modular Representation.
SIAM J. Comput., 1991

1990
Cryptography Based Data Security.
Adv. Comput., 1990

On the Importance of Memory Resources in the Security of Key Exchange Protocols.
Proceedings of the Advances in Cryptology, 1990

1989
Defending Systems against Viruses through Cryptographic Authentication.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

A Key Distribution System Based On Any One-Way Function (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

1988
Passports and Visas Versus IDS (Extended Abstract).
Proceedings of the Advances in Cryptology, 1988

O(log(n)) Parallel Time Finite Field Inversion.
Proceedings of the VLSI Algorithms and Architectures, 3rd Aegean Workshop on Computing, 1988

1987
A Public Key Analog Cryptosystem.
Proceedings of the Advances in Cryptology, 1987

Arbitration in Tamper Proof Systems.
Proceedings of the Advances in Cryptology, 1987

A Crypto-Engine.
Proceedings of the Advances in Cryptology, 1987

1986
Multilevel Cryptosecure Relational Database.
EUROCRYPT, 1986

1984
Disability Independent Computer Systems for the Handicapped.
Proceedings of the COMPCON'84, Digest of Papers, Twenty-Eighth IEEE Computer Society International Conference, San Francisco, California, USA, February 27, 1984

1982
Cryptographic Relational Algebra.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

1981
A Database Encryption System with Subkeys.
ACM Trans. Database Syst., 1981

The Case against restraints on Non-Governmental Research in Cryptography.
Cryptologia, 1981

The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

Multilevel Secure Distributed System.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981

1980
A System Architecture to Support a Verifiably Secure Multilevel Security System.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

Protecting Shared Cryptographic Keys.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

1979
Structured Design of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers, 1979

1978
Database Security.
IEEE Trans. Software Eng., 1978

Privacy, Security and Databases: Any Solutions?
Proceedings of the Issues in Data Base Management, 1978

Security and Privacy.
Proceedings of the Fourth International Conference on Very Large Data Bases, 1978

Security and Privacy.
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

1977
Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where.
Computer, 1977

1975
A new error-locating polynomial for decoding of BCH codes (Corresp.).
IEEE Trans. Inf. Theory, 1975

1974
Optimum Featurs and Graph Isomorphism.
IEEE Trans. Syst. Man Cybern., 1974

1972
Forward-Error Correction with Decision Feedback
Inf. Control., September, 1972

1970
A Class of High-Rate Double-Error-Correcting Convolutional Codes
Inf. Control., May, 1970


  Loading...