Nevenko Zunic

According to our database1, Nevenko Zunic authored at least 20 papers between 1997 and 2004.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2004
Non-PKI methods for public key distribution.
Comput. Secur., 2004

2003
Methods for preventing unauthorized software distribution.
Comput. Secur., 2003

2001
Alternative Method for Unique RSA Primes Generation.
Comput. Secur., 2001

2000
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods.
Comput. Secur., 2000

Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Comput. Secur., 2000

Global Interoperability for Key Recovery.
Comput. Secur., 2000

Methods for Protecting Password Transmission.
Comput. Secur., 2000

Ticket and Challenge-Based Protocols for Timestamping.
Comput. Secur., 2000

Multiparty Biometric-Based Authentication.
Comput. Secur., 2000

Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Comput. Secur., 2000

Additional Key Recovery Function.
Comput. Secur., 2000

Organization Implementation Guidelines for Recovery of Encrypted Information.
Comput. Secur., 2000

Key Recovery Functional Model.
Comput. Secur., 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Hash-based encryption system.
Comput. Secur., 1999

Generating user-based cryptographic keys and random numbers.
Comput. Secur., 1999

Decentralized group key management for secure multicast communications.
Comput. Commun., 1999

1998
Reversible data mixing procedure for efficient public-key encryption.
Comput. Secur., 1998

1997
The data encryption standard.
Inf. Secur. Tech. Rep., 1997

Two-phase cryptographic key recovery system.
Comput. Secur., 1997


  Loading...