dblp.uni-trier.dewww.uni-trier.de

Thomas A. Berson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2003
17EEThomas A. Berson: Cryptography after the Bubble: How to Make an Impact on the World. CT-RSA 2003: 226
2000
16EEThomas A. Berson: Cryptography Everywhere. ASIACRYPT 2000: 72
1999
15EEGuang Gong, Thomas A. Berson, Douglas R. Stinson: Elliptic Curve Pseudorandom Sequence Generators. Selected Areas in Cryptography 1999: 34-48
1997
14EEThomas A. Berson: Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. CRYPTO 1997: 213-220
1996
13 Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. FSE 1996: 15-26
12 Thomas A. Berson: HMOS: Her Mayesty's Orthography Service. Information Hiding 1996: 345
1992
11EEThomas A. Berson: Differential Cryptanalysis Mod 2^32 with Applications to MD5. EUROCRYPT 1992: 71-80
1990
10EEThomas A. Berson, Steven B. Lipner: Guest Editors' Introduction Security and Privacy. IEEE Trans. Software Eng. 16(6): 561-562 (1990)
1989
9 Thomas A. Berson, Thomas Beth: Local Area Network Security, Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989 Springer 1989
8EEJean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson: How to Explain Zero-Knowledge Protocols to Your Children. CRYPTO 1989: 628-631
1987
7 Thomas A. Berson, Teresa F. Lunt: Multilevel Security for Knowledge-Based Systems. IEEE Symposium on Security and Privacy 1987: 235-242
1983
6 Thomas A. Berson, Richard J. Feiertag, R. Kenneth Bauer: Processor-per-Domain Guard Architecture. IEEE Symposium on Security and Privacy 1983: 120
5EER. Kenneth Bauer, Thomas A. Berson, Richard J. Feiertag: A Key Distribution Protocol Using Event Markers ACM Trans. Comput. Syst. 1(3): 249-255 (1983)
1982
4 Thomas A. Berson, R. Kenneth Bauer: Local Network Cryptosystem Architecture. COMPCON 1982: 138-144
3 Thomas A. Berson: Local Network Cryptosystem Architecture: Access Control. CRYPTO 1982: 251-258
2 Thomas A. Berson: Long Key Variants of DES. CRYPTO 1982: 311-313
1981
1 Thomas A. Berson: Local Network Cryptosystem Architecture. CRYPTO 1981: 73-78

Coauthor Index

1R. Kenneth Bauer [4] [5] [6]
2Thomas Beth [9]
3Richard J. Feiertag [5] [6]
4Guang Gong [15]
5Anna Guillou [8]
6Gaïd Guillou [8]
7Gwenolé Guillou [8]
8Louis C. Guillou [8]
9Marie Annick Guillou [8]
10Soazig Guillou [8]
11Lars R. Knudsen [13]
12Steven B. Lipner [10]
13Teresa F. Lunt [7]
14Jean-Jacques Quisquater [8]
15Michaël Quisquater [8]
16Muriel Quisquater [8]
17Myriam Quisquater [8]
18Douglas R. Stinson [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)