2003 |
17 | EE | Thomas A. Berson:
Cryptography after the Bubble: How to Make an Impact on the World.
CT-RSA 2003: 226 |
2000 |
16 | EE | Thomas A. Berson:
Cryptography Everywhere.
ASIACRYPT 2000: 72 |
1999 |
15 | EE | Guang Gong,
Thomas A. Berson,
Douglas R. Stinson:
Elliptic Curve Pseudorandom Sequence Generators.
Selected Areas in Cryptography 1999: 34-48 |
1997 |
14 | EE | Thomas A. Berson:
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack.
CRYPTO 1997: 213-220 |
1996 |
13 | | Lars R. Knudsen,
Thomas A. Berson:
Truncated Differentials of SAFER.
FSE 1996: 15-26 |
12 | | Thomas A. Berson:
HMOS: Her Mayesty's Orthography Service.
Information Hiding 1996: 345 |
1992 |
11 | EE | Thomas A. Berson:
Differential Cryptanalysis Mod 2^32 with Applications to MD5.
EUROCRYPT 1992: 71-80 |
1990 |
10 | EE | Thomas A. Berson,
Steven B. Lipner:
Guest Editors' Introduction Security and Privacy.
IEEE Trans. Software Eng. 16(6): 561-562 (1990) |
1989 |
9 | | Thomas A. Berson,
Thomas Beth:
Local Area Network Security, Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989
Springer 1989 |
8 | EE | Jean-Jacques Quisquater,
Myriam Quisquater,
Muriel Quisquater,
Michaël Quisquater,
Louis C. Guillou,
Marie Annick Guillou,
Gaïd Guillou,
Anna Guillou,
Gwenolé Guillou,
Soazig Guillou,
Thomas A. Berson:
How to Explain Zero-Knowledge Protocols to Your Children.
CRYPTO 1989: 628-631 |
1987 |
7 | | Thomas A. Berson,
Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems.
IEEE Symposium on Security and Privacy 1987: 235-242 |
1983 |
6 | | Thomas A. Berson,
Richard J. Feiertag,
R. Kenneth Bauer:
Processor-per-Domain Guard Architecture.
IEEE Symposium on Security and Privacy 1983: 120 |
5 | EE | R. Kenneth Bauer,
Thomas A. Berson,
Richard J. Feiertag:
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst. 1(3): 249-255 (1983) |
1982 |
4 | | Thomas A. Berson,
R. Kenneth Bauer:
Local Network Cryptosystem Architecture.
COMPCON 1982: 138-144 |
3 | | Thomas A. Berson:
Local Network Cryptosystem Architecture: Access Control.
CRYPTO 1982: 251-258 |
2 | | Thomas A. Berson:
Long Key Variants of DES.
CRYPTO 1982: 311-313 |
1981 |
1 | | Thomas A. Berson:
Local Network Cryptosystem Architecture.
CRYPTO 1981: 73-78 |