dblp.uni-trier.dewww.uni-trier.de

George I. Davida

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
37EEGeorge I. Davida, Bruce E. Litow, Guangwu Xu: Fast Arithmetics Using Chinese Remaindering CoRR abs/0806.1722: (2008)
2005
36 George I. Davida, Jeremy A. Hansen: A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. ICETE 2005: 364-367
35 George I. Davida, Jon Peccarelli: Hardening windows systems. ICETE 2005: 368-371
2002
34 George I. Davida, Yair Frankel, Owen Rees: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings Springer 2002
33EEMark Chapman, George I. Davida: Plausible Deniability Using Automated Linguistic Stegonagraphy. InfraSec 2002: 276-287
2001
32 George I. Davida, Yair Frankel: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings Springer 2001
31EEMark Chapman, George I. Davida, Marc Rennhard: A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. ISC 2001: 156-165
30EEAndrew Chiu, George I. Davida, Bruce E. Litow: Division in logspace-uniform NC1. ITA 35(3): 259-275 (2001)
1999
29EEGeorge I. Davida, Yair Frankel: Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. IMA Int. Conf. 1999: 104-113
1998
28 Eiji Okamoto, George I. Davida, Masahiro Mambo: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings Springer 1998
27EEGeorge I. Davida, Yair Frankel, Brian J. Matt: On Enabling Secure Applications Through Off-Line Biometric Identification. IEEE Symposium on Security and Privacy 1998: 148-157
1997
26 George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung: Anonymity Control in E-Cash Systems. Financial Cryptography 1997: 1-16
25 Mark Chapman, George I. Davida: Hiding the Hidden: A software system for concealing ciphertext as innocuous text. ICICS 1997: 335-345
24 George I. Davida, René Peralta: High-Speed Cryptography. ISW 1997: 116-120
1992
23EEGeorge I. Davida, Yvo Desmedt: Passports and visas versus IDs. Computers & Security 11(3): 253-258 (1992)
1991
22 George I. Davida, Bruce E. Litow: Fast Parallel Arithmetic via Modular Representation. SIAM J. Comput. 20(4): 756-765 (1991)
1990
21EEGeorge I. Davida, Yvo Desmedt, René Peralta: On the Importance of Memory Resources in the Security of Key Exchange Protocols. EUROCRYPT 1990: 11-15
20 George I. Davida, Yvo Desmedt: Cryptography Based Data Security. Advances in Computers 30: 171-222 (1990)
1989
19EEGeorge I. Davida, Yvo Desmedt, René Peralta: A Key Distribution System Based On Any One-Way Function (Extended Abstract). EUROCRYPT 1989: 75-79
18 George I. Davida, Yvo Desmedt, Brian J. Matt: Defending Systems against Viruses through Cryptographic Authentication. IEEE Symposium on Security and Privacy 1989: 312-318
1988
17 Bruce E. Litow, George I. Davida: O(log(n)) Parallel Time Finite Field Inversion. AWOC 1988: 74-80
16EEGeorge I. Davida, Yvo Desmedt: Passports and Visas Versus IDS (Extended Abstract). EUROCRYPT 1988: 183-188
1987
15EEGeorge I. Davida, Brian J. Matt: Arbitration in Tamper Proof Systems. CRYPTO 1987: 216-222
14EEGeorge I. Davida, Frank B. Dancs: A Crypto-Engine. CRYPTO 1987: 257-268
13EEGeorge I. Davida, Gilbert G. Walter: A Public Key Analog Cryptosystem. EUROCRYPT 1987: 143-147
1986
12 George I. Davida, Yi-Shiung Yeh: Multilevel Cryptosecure Relational Database. EUROCRYPT 1986: 50
1984
11 George I. Davida, Jon Livesey: Disability Independent Computer Systems for the Handicapped. COMPCON 1984: 345-352
1981
10 George I. Davida, Richard A. DeMillo, Richard J. Lipton: Multilevel Secure Distributed System. ICDCS 1981: 308-312
9EEGeorge I. Davida, David L. Wells, John B. Kam: A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6(2): 312-328 (1981)
1980
8 George I. Davida, Richard A. DeMillo, Richard J. Lipton: Protecting Shared Cryptographic Keys. IEEE Symposium on Security and Privacy 1980: 100-102
7 George I. Davida, Richard A. DeMillo, Richard J. Lipton: A System Architecture to Support a Verifiably Secure Multilevel Security System. IEEE Symposium on Security and Privacy 1980: 137-144
1979
6 John B. Kam, George I. Davida: Structured Design of Substitution-Permutation Encryption Networks. IEEE Trans. Computers 28(10): 747-753 (1979)
1978
5EEGeorge I. Davida: Security and Privacy. VLDB 1978: 54
4 George I. Davida: Privacy, Security and Databases: Any Solutions? VLDB Surveys 1978: 249-251
3 George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells: Database Security. IEEE Trans. Software Eng. 4(6): 531-533 (1978)
1972
2 George I. Davida, Sudhakar M. Reddy: Forward-Error Correction with Decision Feedback Information and Control 21(2): 117-133 (1972)
1970
1 Sudhakar M. Reddy, George I. Davida, John P. Robinson: A Class of High-Rate Double-Error-Correcting Convolutional Codes Information and Control 16(3): 225-230 (1970)

Coauthor Index

1Mark Chapman [25] [31] [33]
2Andrew Chiu [30]
3Frank B. Dancs [14]
4Richard A. DeMillo [7] [8] [10]
5Yvo Desmedt [16] [18] [19] [20] [21] [23]
6Yair Frankel [26] [27] [29] [32] [34]
7Jeremy A. Hansen [36]
8John B. Kam [6] [9]
9David J. Linton [3]
10Richard J. Lipton [7] [8] [10]
11Bruce E. Litow [17] [22] [30] [37]
12Jon Livesey [11]
13Masahiro Mambo [28]
14Brian J. Matt [15] [18] [27]
15Eiji Okamoto [28]
16Jon Peccarelli [35]
17René Peralta [19] [21] [24]
18Sudhakar M. Reddy [1] [2]
19Owen Rees [34]
20Marc Rennhard [31]
21John P. Robinson [1]
22C. Russel Szelag [3]
23Yiannis Tsiounis [26]
24Gilbert G. Walter [13]
25David L. Wells [3] [9]
26Guangwu Xu [37]
27Yi-Shiung Yeh [12]
28Moti Yung (Mordechai M. Yung) [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)