2008 |
18 | EE | Whitfield Diffie:
Information security: 50 years behind, 50 years ahead.
Commun. ACM 51(1): 55-57 (2008) |
2007 |
17 | EE | Whitfield Diffie:
Cryptography: Past, Present and Future.
OTM Conferences (2) 2007: 1529-1530 |
16 | EE | Steven M. Bellovin,
Matt Blaze,
Whitfield Diffie,
Susan Landau,
Jennifer Rexford,
Peter G. Neumann:
Internal surveillance, external risks.
Commun. ACM 50(12): 128 (2007) |
2006 |
15 | EE | Whitfield Diffie:
Chattering about SIGINT.
IEEE Security & Privacy 4(1): 9 (2006) |
2001 |
14 | EE | Whitfield Diffie:
Ultimate cryptography.
Commun. ACM 44(3): 84-86 (2001) |
1998 |
13 | EE | Whitfield Diffie:
E-commerce and security.
ACM StandardView 6(3): 116-117 (1998) |
1996 |
12 | | Thomas Beth,
Whitfield Diffie:
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue.
Des. Codes Cryptography 7(1-2): 7-9 (1996) |
11 | | Whitfield Diffie:
The National Security Establishment and the Development of Public-Key Cryptography.
Des. Codes Cryptography 7(1-2): 9-12 (1996) |
1994 |
10 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
1992 |
9 | | Whitfield Diffie,
Paul C. van Oorschot,
Michael J. Wiener:
Authentication and Authenticated Key Exchanges.
Des. Codes Cryptography 2(2): 107-125 (1992) |
1989 |
8 | EE | Whitfield Diffie:
The Adolescence of Public-Key Cryptography (Abstract).
EUROCRYPT 1989: 2 |
1988 |
7 | EE | D. G. Steer,
L. Strawczynski,
Whitfield Diffie,
Michael J. Wiener:
A Secure Audio Teleconference System.
CRYPTO 1988: 520-528 |
1985 |
6 | EE | Whitfield Diffie:
Security for the DoD Transmission Control Protocol.
CRYPTO 1985: 108-127 |
5 | EE | Harriet J. Fell,
Whitfield Diffie:
Analysis of a Public Key Approach Based on Polynomial Substitution.
CRYPTO 1985: 340-349 |
1983 |
4 | | Whitfield Diffie:
Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems.
IEEE Symposium on Security and Privacy 1983: 136-138 |
1981 |
3 | | Whitfield Diffie,
Melville Klein,
Michael L. Dertouzos,
Andrew Gleason,
Dean Smith:
National Security and Commercial Security: Division of Responsibility.
CRYPTO 1981: 154-156 |
2 | | Whitfield Diffie:
Cryptography, the Next Two Decades.
CRYPTO 1981: 84-108 |
1976 |
1 | EE | Whitfield Diffie,
Martin E. Hellman:
Multiuser cryptographic techniques.
AFIPS National Computer Conference 1976: 109-112 |