George I. Davida
Affiliations:- University of Wisconsin-Milwaukee, USA
According to our database1,
George I. Davida
authored at least 43 papers
between 1970 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2012
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2009
2007
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms.
IACR Cryptol. ePrint Arch., 2007
2005
Hardening windows systems.
Proceedings of the ICETE 2005, 2005
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms.
Proceedings of the ICETE 2005, 2005
2002
Proceedings of the Infrastructure Security, International Conference, 2002
2001
RAIRO Theor. Informatics Appl., 2001
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.
Proceedings of the Information Security, 4th International Conference, 2001
1999
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.
Proceedings of the Cryptography and Coding, 1999
1998
Proceedings of the Security and Privacy, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1992
1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the VLSI Algorithms and Architectures, 3rd Aegean Workshop on Computing, 1988
1987
1986
Multilevel Cryptosecure Relational Database.
EUROCRYPT, 1986
1984
Disability Independent Computer Systems for the Handicapped.
Proceedings of the COMPCON'84, Digest of Papers, Twenty-Eighth IEEE Computer Society International Conference, San Francisco, California, USA, February 27, 1984
1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
1981
Cryptologia, 1981
The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
Multilevel Secure Distributed System.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981
1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
IEEE Trans. Computers, 1979
1978
Privacy, Security and Databases: Any Solutions?
Proceedings of the Issues in Data Base Management, 1978
Security and Privacy.
Proceedings of the Fourth International Conference on Very Large Data Bases, 1978
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978
1977
Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where.
Computer, 1977
1975
IEEE Trans. Inf. Theory, 1975
1974
1972
1970
Inf. Control., May, 1970