| 2004 |
| 19 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Non-PKI methods for public key distribution.
Computers & Security 23(2): 97-103 (2004) |
| 2003 |
| 18 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Methods for preventing unauthorized software distribution.
Computers & Security 22(4): 316-321 (2003) |
| 2001 |
| 17 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation.
Computers & Security 20(2): 173-179 (2001) |
| 2000 |
| 16 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
| 15 | | Chuck Williams,
Nevenko Zunic,
Stephen M. Matyas,
Sarbari Gupta,
Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Computers & Security 19(1): 18-20 (2000) |
| 14 | | John Kennedy,
Stephen M. Matyas,
Nevenko Zunic:
Key Recovery Functional Model.
Computers & Security 19(1): 31-36 (2000) |
| 13 | | Stephen M. Matyas,
Nevenko Zunic:
Additional Key Recovery Function.
Computers & Security 19(1): 37-40 (2000) |
| 12 | | Chuck Williams,
Nevenko Zunic:
Global Interoperability for Key Recovery.
Computers & Security 19(1): 48-55 (2000) |
| 11 | | Abby Maclean,
Stephen M. Matyas,
Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information.
Computers & Security 19(1): 69-81 (2000) |
| 10 | | Nevenko Zunic:
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods.
Computers & Security 19(1): 82-85 (2000) |
| 9 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Computers & Security 19(3): 282-288 (2000) |
| 8 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Multiparty Biometric-Based Authentication.
Computers & Security 19(4): 369-374 (2000) |
| 7 | | Mohammad Peyravian,
Nevenko Zunic:
Methods for Protecting Password Transmission.
Computers & Security 19(5): 466-469 (2000) |
| 6 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
Computers & Security 19(6): 551-558 (2000) |
| 1999 |
| 5 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Nevenko Zunic:
Decentralized group key management for secure multicast communications.
Computer Communications 22(13): 1183-1187 (1999) |
| 4 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Hash-based encryption system.
Computers & Security 18(4): 345-350 (1999) |
| 3 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generating user-based cryptographic keys and random numbers.
Computers & Security 18(7): 619-626 (1999) |
| 1998 |
| 2 | EE | Mike Matyas,
Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption.
Computers & Security 17(3): 265-272 (1998) |
| 1997 |
| 1 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |