Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas A. Berson
@article{DBLP:journals/ieeesp/BersonD11, author = {Thomas A. Berson and Dorothy E. Denning}, title = {Cyberwarfare}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {5}, pages = {13--15}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.132}, doi = {10.1109/MSP.2011.132}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BersonD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Berson03, author = {Thomas A. Berson}, editor = {Marc Joye}, title = {Cryptography after the Bubble: How to Make an Impact on the World}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {226}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_15}, doi = {10.1007/3-540-36563-X\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Berson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Berson00, author = {Thomas A. Berson}, editor = {Tatsuaki Okamoto}, title = {Cryptography Everywhere}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {72}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_6}, doi = {10.1007/3-540-44448-3\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Berson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GongBS99, author = {Guang Gong and Thomas A. Berson and Douglas R. Stinson}, editor = {Howard M. Heys and Carlisle M. Adams}, title = {Elliptic Curve Pseudorandom Sequence Generators}, booktitle = {Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1758}, pages = {34--48}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46513-8\_3}, doi = {10.1007/3-540-46513-8\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GongBS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Berson97, author = {Thomas A. Berson}, editor = {Burton S. Kaliski Jr.}, title = {Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {213--220}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052237}, doi = {10.1007/BFB0052237}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Berson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenB96, author = {Lars R. Knudsen and Thomas A. Berson}, editor = {Dieter Gollmann}, title = {Truncated Differentials of {SAFER}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {15--26}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_38}, doi = {10.1007/3-540-60865-6\_38}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Berson96, author = {Thomas A. Berson}, editor = {Ross J. Anderson}, title = {{HMOS:} Her Mayesty's Orthography Service}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {345}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_51}, doi = {10.1007/3-540-61996-8\_51}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Berson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Berson92, author = {Thomas A. Berson}, editor = {Rainer A. Rueppel}, title = {Differential Cryptanalysis Mod 2{\^{}}32 with Applications to {MD5}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {71--80}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_6}, doi = {10.1007/3-540-47555-9\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Berson92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BersonL90, author = {Thomas A. Berson and Steven B. Lipner}, title = {Guest Editors' Introduction Security and Privacy}, journal = {{IEEE} Trans. Software Eng.}, volume = {16}, number = {6}, pages = {561--562}, year = {1990}, url = {http://doi.ieeecomputersociety.org/10.1109/TSE.1990.10002}, doi = {10.1109/TSE.1990.10002}, timestamp = {Thu, 10 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/BersonL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89, author = {Jean{-}Jacques Quisquater and Myriam Quisquater and Muriel Quisquater and Micha{\"{e}}l Quisquater and Louis C. Guillou and Marie Annick Guillou and Ga{\"{\i}}d Guillou and Anna Guillou and Gwenol{\'{e}} Guillou and Soazig Guillou and Thomas A. Berson}, editor = {Gilles Brassard}, title = {How to Explain Zero-Knowledge Protocols to Your Children}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {628--631}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_60}, doi = {10.1007/0-387-34805-0\_60}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/lansec/1989, editor = {Thomas A. Berson and Thomas Beth}, title = {Local Area Network Security, Workshop {LANSEC} '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989}, series = {Lecture Notes in Computer Science}, volume = {396}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-51754-5}, doi = {10.1007/3-540-51754-5}, isbn = {3-540-51754-5}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lansec/1989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BersonL87, author = {Thomas A. Berson and Teresa F. Lunt}, title = {Multilevel Security for Knowledge-Based Systems}, booktitle = {Proceedings of the 1987 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 27-29, 1987}, pages = {235--242}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/SP.1987.10024}, doi = {10.1109/SP.1987.10024}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/BersonL87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WongBF85, author = {Raymond M. Wong and Thomas A. Berson and Richard J. Feiertag}, title = {Polonium: An Identity Authentication System}, booktitle = {1985 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985}, pages = {101--107}, publisher = {{IEEE} Computer Society}, year = {1985}, url = {https://doi.org/10.1109/SP.1985.10001}, doi = {10.1109/SP.1985.10001}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/WongBF85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/BauerBF83, author = {R. Kenneth Bauer and Thomas A. Berson and Richard J. Feiertag}, title = {A Key Distribution Protocol Using Event Markers}, journal = {{ACM} Trans. Comput. Syst.}, volume = {1}, number = {3}, pages = {249--255}, year = {1983}, url = {https://doi.org/10.1145/357369.357373}, doi = {10.1145/357369.357373}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/BauerBF83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BersonFB83, author = {Thomas A. Berson and Richard J. Feiertag and R. Kenneth Bauer}, title = {Processor-per-Domain Guard Architecture}, booktitle = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983}, pages = {120}, publisher = {{IEEE} Computer Society}, year = {1983}, url = {https://doi.org/10.1109/SP.1983.10006}, doi = {10.1109/SP.1983.10006}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/BersonFB83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/BersonB82, author = {Thomas A. Berson and R. Kenneth Bauer}, title = {Local Network Cryptosystem Architecture}, booktitle = {COMPCON'82, Digest of Papers, Twenty-Fourth {IEEE} Computer Society International Conference, San Francisco, California, USA, February 22-25, 1982}, pages = {138--144}, publisher = {{IEEE} Computer Society}, year = {1982}, timestamp = {Tue, 20 Jun 2006 14:09:50 +0200}, biburl = {https://dblp.org/rec/conf/compcon/BersonB82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Berson82, author = {Thomas A. Berson}, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {Local Network Cryptosystem Architecture: Access Control}, booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, pages = {251--258}, publisher = {Plenum Press, New York}, year = {1982}, url = {https://doi.org/10.1007/978-1-4757-0602-4\_24}, doi = {10.1007/978-1-4757-0602-4\_24}, timestamp = {Thu, 25 Jul 2019 12:26:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Berson82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Berson82a, author = {Thomas A. Berson}, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {Long Key Variants of {DES}}, booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, pages = {311--313}, publisher = {Plenum Press, New York}, year = {1982}, url = {https://doi.org/10.1007/978-1-4757-0602-4\_30}, doi = {10.1007/978-1-4757-0602-4\_30}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Berson82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/FeiertagB81, author = {Richard J. Feiertag and Thomas A. Berson}, title = {An avenue for exploitation and development of verification technology}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {6}, number = {3}, pages = {45--46}, year = {1981}, url = {https://doi.org/10.1145/1010832.1010848}, doi = {10.1145/1010832.1010848}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/FeiertagB81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Berson81, author = {Thomas A. Berson}, editor = {Allen Gersho}, title = {Local Network Cryptosystem Architecture}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {73--78}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Berson81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.