Thomas A. Berson

According to our database1, Thomas A. Berson authored at least 19 papers between 1981 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Cyberwarfare.
IEEE Secur. Priv., 2011

2003
Cryptography after the Bubble: How to Make an Impact on the World.
Proceedings of the Topics in Cryptology, 2003

2000
Cryptography Everywhere.
Proceedings of the Advances in Cryptology, 2000

1999
Elliptic Curve Pseudorandom Sequence Generators.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1997
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack.
Proceedings of the Advances in Cryptology, 1997

1996
HMOS: Her Mayesty's Orthography Service.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Truncated Differentials of SAFER.
Proceedings of the Fast Software Encryption, 1996

1992
Differential Cryptanalysis Mod 2^32 with Applications to MD5.
Proceedings of the Advances in Cryptology, 1992

1990
Guest Editors' Introduction Security and Privacy.
IEEE Trans. Software Eng., 1990

1989

1987
Multilevel Security for Knowledge-Based Systems.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1985
Polonium: An Identity Authentication System.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1983
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst., 1983

Processor-per-Domain Guard Architecture.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
Long Key Variants of DES.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

Local Network Cryptosystem Architecture: Access Control.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

Local Network Cryptosystem Architecture.
Proceedings of the COMPCON'82, 1982

1981
An avenue for exploitation and development of verification technology.
ACM SIGSOFT Softw. Eng. Notes, 1981

Local Network Cryptosystem Architecture.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981


  Loading...