dblp.uni-trier.dewww.uni-trier.de

Nevenko Zunic

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2004
19EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Non-PKI methods for public key distribution. Computers & Security 23(2): 97-103 (2004)
2003
18EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Methods for preventing unauthorized software distribution. Computers & Security 22(4): 316-321 (2003)
2001
17 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Alternative Method for Unique RSA Primes Generation. Computers & Security 20(2): 173-179 (2001)
2000
16 Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic: IBM Comments. AES Candidate Conference 2000: 333-336
15 Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett: Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. Computers & Security 19(1): 18-20 (2000)
14 John Kennedy, Stephen M. Matyas, Nevenko Zunic: Key Recovery Functional Model. Computers & Security 19(1): 31-36 (2000)
13 Stephen M. Matyas, Nevenko Zunic: Additional Key Recovery Function. Computers & Security 19(1): 37-40 (2000)
12 Chuck Williams, Nevenko Zunic: Global Interoperability for Key Recovery. Computers & Security 19(1): 48-55 (2000)
11 Abby Maclean, Stephen M. Matyas, Nevenko Zunic: Organization Implementation Guidelines for Recovery of Encrypted Information. Computers & Security 19(1): 69-81 (2000)
10 Nevenko Zunic: Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. Computers & Security 19(1): 82-85 (2000)
9 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computers & Security 19(3): 282-288 (2000)
8 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Multiparty Biometric-Based Authentication. Computers & Security 19(4): 369-374 (2000)
7 Mohammad Peyravian, Nevenko Zunic: Methods for Protecting Password Transmission. Computers & Security 19(5): 466-469 (2000)
6 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Ticket and Challenge-Based Protocols for Timestamping. Computers & Security 19(6): 551-558 (2000)
1999
5EEMohammad Peyravian, Stephen M. Matyas, Nevenko Zunic: Decentralized group key management for secure multicast communications. Computer Communications 22(13): 1183-1187 (1999)
4EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Hash-based encryption system. Computers & Security 18(4): 345-350 (1999)
3EEMohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7): 619-626 (1999)
1998
2EEMike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic: Reversible data mixing procedure for efficient public-key encryption. Computers & Security 17(3): 265-272 (1998)
1997
1EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)

Coauthor Index

1Don Coppersmith [16]
2Rosario Gennaro [1] [16]
3Sarbari Gupta [15]
4Shai Halevi [16]
5Charanjit S. Jutla [16]
6Paul A. Karger [1]
7John Kennedy [14]
8Abby Maclean [11]
9Mike Matyas [2]
10Stephen M. Matyas [1] [3] [5] [6] [8] [9] [11] [13] [14] [15] [16] [17]
11Mohammad Peyravian [1] [2] [3] [4] [5] [6] [7] [8] [9] [16] [17] [18] [19]
12Allen Roginsky [1] [2] [3] [4] [6] [8] [9] [17] [18] [19]
13David Safford [1] [16]
14Michael Willett [1] [15]
15Chuck Williams [12] [15]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)