2004 |
19 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Non-PKI methods for public key distribution.
Computers & Security 23(2): 97-103 (2004) |
2003 |
18 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Methods for preventing unauthorized software distribution.
Computers & Security 22(4): 316-321 (2003) |
2001 |
17 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation.
Computers & Security 20(2): 173-179 (2001) |
2000 |
16 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
15 | | Chuck Williams,
Nevenko Zunic,
Stephen M. Matyas,
Sarbari Gupta,
Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Computers & Security 19(1): 18-20 (2000) |
14 | | John Kennedy,
Stephen M. Matyas,
Nevenko Zunic:
Key Recovery Functional Model.
Computers & Security 19(1): 31-36 (2000) |
13 | | Stephen M. Matyas,
Nevenko Zunic:
Additional Key Recovery Function.
Computers & Security 19(1): 37-40 (2000) |
12 | | Chuck Williams,
Nevenko Zunic:
Global Interoperability for Key Recovery.
Computers & Security 19(1): 48-55 (2000) |
11 | | Abby Maclean,
Stephen M. Matyas,
Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information.
Computers & Security 19(1): 69-81 (2000) |
10 | | Nevenko Zunic:
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods.
Computers & Security 19(1): 82-85 (2000) |
9 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Computers & Security 19(3): 282-288 (2000) |
8 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Multiparty Biometric-Based Authentication.
Computers & Security 19(4): 369-374 (2000) |
7 | | Mohammad Peyravian,
Nevenko Zunic:
Methods for Protecting Password Transmission.
Computers & Security 19(5): 466-469 (2000) |
6 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
Computers & Security 19(6): 551-558 (2000) |
1999 |
5 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Nevenko Zunic:
Decentralized group key management for secure multicast communications.
Computer Communications 22(13): 1183-1187 (1999) |
4 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Hash-based encryption system.
Computers & Security 18(4): 345-350 (1999) |
3 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generating user-based cryptographic keys and random numbers.
Computers & Security 18(7): 619-626 (1999) |
1998 |
2 | EE | Mike Matyas,
Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption.
Computers & Security 17(3): 265-272 (1998) |
1997 |
1 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |