BibTeX records: Thomas A. Berson

download as .bib file

@article{DBLP:journals/ieeesp/BersonD11,
  author       = {Thomas A. Berson and
                  Dorothy E. Denning},
  title        = {Cyberwarfare},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {5},
  pages        = {13--15},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.132},
  doi          = {10.1109/MSP.2011.132},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BersonD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Berson03,
  author       = {Thomas A. Berson},
  editor       = {Marc Joye},
  title        = {Cryptography after the Bubble: How to Make an Impact on the World},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {226},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_15},
  doi          = {10.1007/3-540-36563-X\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Berson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Berson00,
  author       = {Thomas A. Berson},
  editor       = {Tatsuaki Okamoto},
  title        = {Cryptography Everywhere},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {72},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_6},
  doi          = {10.1007/3-540-44448-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Berson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GongBS99,
  author       = {Guang Gong and
                  Thomas A. Berson and
                  Douglas R. Stinson},
  editor       = {Howard M. Heys and
                  Carlisle M. Adams},
  title        = {Elliptic Curve Pseudorandom Sequence Generators},
  booktitle    = {Selected Areas in Cryptography, 6th Annual International Workshop,
                  SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1758},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46513-8\_3},
  doi          = {10.1007/3-540-46513-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GongBS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Berson97,
  author       = {Thomas A. Berson},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Failure of the McEliece Public-Key Cryptosystem Under Message-Resend
                  and Related-Message Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052237},
  doi          = {10.1007/BFB0052237},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Berson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenB96,
  author       = {Lars R. Knudsen and
                  Thomas A. Berson},
  editor       = {Dieter Gollmann},
  title        = {Truncated Differentials of {SAFER}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {15--26},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_38},
  doi          = {10.1007/3-540-60865-6\_38},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Berson96,
  author       = {Thomas A. Berson},
  editor       = {Ross J. Anderson},
  title        = {{HMOS:} Her Mayesty's Orthography Service},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {345},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_51},
  doi          = {10.1007/3-540-61996-8\_51},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Berson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Berson92,
  author       = {Thomas A. Berson},
  editor       = {Rainer A. Rueppel},
  title        = {Differential Cryptanalysis Mod 2{\^{}}32 with Applications to {MD5}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {71--80},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_6},
  doi          = {10.1007/3-540-47555-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Berson92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BersonL90,
  author       = {Thomas A. Berson and
                  Steven B. Lipner},
  title        = {Guest Editors' Introduction Security and Privacy},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {16},
  number       = {6},
  pages        = {561--562},
  year         = {1990},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TSE.1990.10002},
  doi          = {10.1109/TSE.1990.10002},
  timestamp    = {Thu, 10 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/BersonL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89,
  author       = {Jean{-}Jacques Quisquater and
                  Myriam Quisquater and
                  Muriel Quisquater and
                  Micha{\"{e}}l Quisquater and
                  Louis C. Guillou and
                  Marie Annick Guillou and
                  Ga{\"{\i}}d Guillou and
                  Anna Guillou and
                  Gwenol{\'{e}} Guillou and
                  Soazig Guillou and
                  Thomas A. Berson},
  editor       = {Gilles Brassard},
  title        = {How to Explain Zero-Knowledge Protocols to Your Children},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {628--631},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_60},
  doi          = {10.1007/0-387-34805-0\_60},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lansec/1989,
  editor       = {Thomas A. Berson and
                  Thomas Beth},
  title        = {Local Area Network Security, Workshop {LANSEC} '89, European Institute
                  for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989},
  series       = {Lecture Notes in Computer Science},
  volume       = {396},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-51754-5},
  doi          = {10.1007/3-540-51754-5},
  isbn         = {3-540-51754-5},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lansec/1989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BersonL87,
  author       = {Thomas A. Berson and
                  Teresa F. Lunt},
  title        = {Multilevel Security for Knowledge-Based Systems},
  booktitle    = {Proceedings of the 1987 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 27-29, 1987},
  pages        = {235--242},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/SP.1987.10024},
  doi          = {10.1109/SP.1987.10024},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BersonL87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WongBF85,
  author       = {Raymond M. Wong and
                  Thomas A. Berson and
                  Richard J. Feiertag},
  title        = {Polonium: An Identity Authentication System},
  booktitle    = {1985 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April
                  22-24, 1985},
  pages        = {101--107},
  publisher    = {{IEEE} Computer Society},
  year         = {1985},
  url          = {https://doi.org/10.1109/SP.1985.10001},
  doi          = {10.1109/SP.1985.10001},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WongBF85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BauerBF83,
  author       = {R. Kenneth Bauer and
                  Thomas A. Berson and
                  Richard J. Feiertag},
  title        = {A Key Distribution Protocol Using Event Markers},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {249--255},
  year         = {1983},
  url          = {https://doi.org/10.1145/357369.357373},
  doi          = {10.1145/357369.357373},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/BauerBF83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BersonFB83,
  author       = {Thomas A. Berson and
                  Richard J. Feiertag and
                  R. Kenneth Bauer},
  title        = {Processor-per-Domain Guard Architecture},
  booktitle    = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 25-27, 1983},
  pages        = {120},
  publisher    = {{IEEE} Computer Society},
  year         = {1983},
  url          = {https://doi.org/10.1109/SP.1983.10006},
  doi          = {10.1109/SP.1983.10006},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BersonFB83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/BersonB82,
  author       = {Thomas A. Berson and
                  R. Kenneth Bauer},
  title        = {Local Network Cryptosystem Architecture},
  booktitle    = {COMPCON'82, Digest of Papers, Twenty-Fourth {IEEE} Computer Society
                  International Conference, San Francisco, California, USA, February
                  22-25, 1982},
  pages        = {138--144},
  publisher    = {{IEEE} Computer Society},
  year         = {1982},
  timestamp    = {Tue, 20 Jun 2006 14:09:50 +0200},
  biburl       = {https://dblp.org/rec/conf/compcon/BersonB82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Berson82,
  author       = {Thomas A. Berson},
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Local Network Cryptosystem Architecture: Access Control},
  booktitle    = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  pages        = {251--258},
  publisher    = {Plenum Press, New York},
  year         = {1982},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4\_24},
  doi          = {10.1007/978-1-4757-0602-4\_24},
  timestamp    = {Thu, 25 Jul 2019 12:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Berson82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Berson82a,
  author       = {Thomas A. Berson},
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Long Key Variants of {DES}},
  booktitle    = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  pages        = {311--313},
  publisher    = {Plenum Press, New York},
  year         = {1982},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4\_30},
  doi          = {10.1007/978-1-4757-0602-4\_30},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Berson82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/FeiertagB81,
  author       = {Richard J. Feiertag and
                  Thomas A. Berson},
  title        = {An avenue for exploitation and development of verification technology},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {6},
  number       = {3},
  pages        = {45--46},
  year         = {1981},
  url          = {https://doi.org/10.1145/1010832.1010848},
  doi          = {10.1145/1010832.1010848},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/FeiertagB81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Berson81,
  author       = {Thomas A. Berson},
  editor       = {Allen Gersho},
  title        = {Local Network Cryptosystem Architecture},
  booktitle    = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
                  Workshop on Communications Security, Santa Barbara, California, USA,
                  August 24-26, 1981},
  pages        = {73--78},
  publisher    = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
                  No 82-04},
  year         = {1981},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Berson81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics