| 2003 |
| 17 | EE | Thomas A. Berson:
Cryptography after the Bubble: How to Make an Impact on the World.
CT-RSA 2003: 226 |
| 2000 |
| 16 | EE | Thomas A. Berson:
Cryptography Everywhere.
ASIACRYPT 2000: 72 |
| 1999 |
| 15 | EE | Guang Gong,
Thomas A. Berson,
Douglas R. Stinson:
Elliptic Curve Pseudorandom Sequence Generators.
Selected Areas in Cryptography 1999: 34-48 |
| 1997 |
| 14 | EE | Thomas A. Berson:
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack.
CRYPTO 1997: 213-220 |
| 1996 |
| 13 | | Lars R. Knudsen,
Thomas A. Berson:
Truncated Differentials of SAFER.
FSE 1996: 15-26 |
| 12 | | Thomas A. Berson:
HMOS: Her Mayesty's Orthography Service.
Information Hiding 1996: 345 |
| 1992 |
| 11 | EE | Thomas A. Berson:
Differential Cryptanalysis Mod 2^32 with Applications to MD5.
EUROCRYPT 1992: 71-80 |
| 1990 |
| 10 | EE | Thomas A. Berson,
Steven B. Lipner:
Guest Editors' Introduction Security and Privacy.
IEEE Trans. Software Eng. 16(6): 561-562 (1990) |
| 1989 |
| 9 | | Thomas A. Berson,
Thomas Beth:
Local Area Network Security, Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989
Springer 1989 |
| 8 | EE | Jean-Jacques Quisquater,
Myriam Quisquater,
Muriel Quisquater,
Michaël Quisquater,
Louis C. Guillou,
Marie Annick Guillou,
Gaïd Guillou,
Anna Guillou,
Gwenolé Guillou,
Soazig Guillou,
Thomas A. Berson:
How to Explain Zero-Knowledge Protocols to Your Children.
CRYPTO 1989: 628-631 |
| 1987 |
| 7 | | Thomas A. Berson,
Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems.
IEEE Symposium on Security and Privacy 1987: 235-242 |
| 1983 |
| 6 | | Thomas A. Berson,
Richard J. Feiertag,
R. Kenneth Bauer:
Processor-per-Domain Guard Architecture.
IEEE Symposium on Security and Privacy 1983: 120 |
| 5 | EE | R. Kenneth Bauer,
Thomas A. Berson,
Richard J. Feiertag:
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst. 1(3): 249-255 (1983) |
| 1982 |
| 4 | | Thomas A. Berson,
R. Kenneth Bauer:
Local Network Cryptosystem Architecture.
COMPCON 1982: 138-144 |
| 3 | | Thomas A. Berson:
Local Network Cryptosystem Architecture: Access Control.
CRYPTO 1982: 251-258 |
| 2 | | Thomas A. Berson:
Long Key Variants of DES.
CRYPTO 1982: 311-313 |
| 1981 |
| 1 | | Thomas A. Berson:
Local Network Cryptosystem Architecture.
CRYPTO 1981: 73-78 |