| 2009 |
38 | | George I. Davida,
Bruce E. Litow,
Guangwu Xu:
Fast arithmetics using Chinese remaindering.
Inf. Process. Lett. 109(13): 660-662 (2009) |
| 2008 |
37 | | George I. Davida,
Bruce E. Litow,
Guangwu Xu:
Fast Arithmetics Using Chinese Remaindering
CoRR abs/0806.1722: (2008) |
| 2005 |
36 | | George I. Davida,
Jeremy A. Hansen:
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms.
ICETE 2005: 364-367 |
35 | | George I. Davida,
Jon Peccarelli:
Hardening windows systems.
ICETE 2005: 368-371 |
| 2002 |
34 | | George I. Davida,
Yair Frankel,
Owen Rees:
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings
Springer 2002 |
33 | | Mark Chapman,
George I. Davida:
Plausible Deniability Using Automated Linguistic Stegonagraphy.
InfraSec 2002: 276-287 |
| 2001 |
32 | | George I. Davida,
Yair Frankel:
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings
Springer 2001 |
31 | | Mark Chapman,
George I. Davida,
Marc Rennhard:
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.
ISC 2001: 156-165 |
30 | | Andrew Chiu,
George I. Davida,
Bruce E. Litow:
Division in logspace-uniform NC1.
ITA 35(3): 259-275 (2001) |
| 1999 |
29 | | George I. Davida,
Yair Frankel:
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.
IMA Int. Conf. 1999: 104-113 |
| 1998 |
28 | | Eiji Okamoto,
George I. Davida,
Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings
Springer 1998 |
27 | | George I. Davida,
Yair Frankel,
Brian J. Matt:
On Enabling Secure Applications Through Off-Line Biometric Identification.
IEEE Symposium on Security and Privacy 1998: 148-157 |
| 1997 |
26 | | George I. Davida,
Yair Frankel,
Yiannis Tsiounis,
Moti Yung:
Anonymity Control in E-Cash Systems.
Financial Cryptography 1997: 1-16 |
25 | | Mark Chapman,
George I. Davida:
Hiding the Hidden: A software system for concealing ciphertext as innocuous text.
ICICS 1997: 335-345 |
24 | | George I. Davida,
René Peralta:
High-Speed Cryptography.
ISW 1997: 116-120 |
| 1992 |
23 | | George I. Davida,
Yvo Desmedt:
Passports and visas versus IDs.
Computers & Security 11(3): 253-258 (1992) |
| 1991 |
22 | | George I. Davida,
Bruce E. Litow:
Fast Parallel Arithmetic via Modular Representation.
SIAM J. Comput. 20(4): 756-765 (1991) |
| 1990 |
21 | | George I. Davida,
Yvo Desmedt,
René Peralta:
On the Importance of Memory Resources in the Security of Key Exchange Protocols.
EUROCRYPT 1990: 11-15 |
20 | | George I. Davida,
Yvo Desmedt:
Cryptography Based Data Security.
Advances in Computers 30: 171-222 (1990) |
| 1989 |
19 | | George I. Davida,
Yvo Desmedt,
René Peralta:
A Key Distribution System Based On Any One-Way Function (Extended Abstract).
EUROCRYPT 1989: 75-79 |
18 | | George I. Davida,
Yvo Desmedt,
Brian J. Matt:
Defending Systems against Viruses through Cryptographic Authentication.
IEEE Symposium on Security and Privacy 1989: 312-318 |
| 1988 |
17 | | Bruce E. Litow,
George I. Davida:
O(log(n)) Parallel Time Finite Field Inversion.
AWOC 1988: 74-80 |
16 | | George I. Davida,
Yvo Desmedt:
Passports and Visas Versus IDS (Extended Abstract).
EUROCRYPT 1988: 183-188 |
| 1987 |
15 | | George I. Davida,
Brian J. Matt:
Arbitration in Tamper Proof Systems.
CRYPTO 1987: 216-222 |
14 | | George I. Davida,
Frank B. Dancs:
A Crypto-Engine.
CRYPTO 1987: 257-268 |
13 | | George I. Davida,
Gilbert G. Walter:
A Public Key Analog Cryptosystem.
EUROCRYPT 1987: 143-147 |
| 1986 |
12 | | George I. Davida,
Yi-Shiung Yeh:
Multilevel Cryptosecure Relational Database.
EUROCRYPT 1986: 50 |
| 1984 |
11 | | George I. Davida,
Jon Livesey:
Disability Independent Computer Systems for the Handicapped.
COMPCON 1984: 345-352 |
| 1981 |
10 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
Multilevel Secure Distributed System.
ICDCS 1981: 308-312 |
9 | | George I. Davida,
David L. Wells,
John B. Kam:
A Database Encryption System with Subkeys.
ACM Trans. Database Syst. 6(2): 312-328 (1981) |
| 1980 |
8 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
Protecting Shared Cryptographic Keys.
IEEE Symposium on Security and Privacy 1980: 100-102 |
7 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System.
IEEE Symposium on Security and Privacy 1980: 137-144 |
| 1979 |
6 | | John B. Kam,
George I. Davida:
Structured Design of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers 28(10): 747-753 (1979) |
| 1978 |
5 | | George I. Davida:
Security and Privacy.
VLDB 1978: 54 |
4 | | George I. Davida:
Privacy, Security and Databases: Any Solutions?
VLDB Surveys 1978: 249-251 |
3 | | George I. Davida,
David J. Linton,
C. Russel Szelag,
David L. Wells:
Database Security.
IEEE Trans. Software Eng. 4(6): 531-533 (1978) |
| 1972 |
2 | | George I. Davida,
Sudhakar M. Reddy:
Forward-Error Correction with Decision Feedback
Information and Control 21(2): 117-133 (1972) |
| 1970 |
1 | | Sudhakar M. Reddy,
George I. Davida,
John P. Robinson:
A Class of High-Rate Double-Error-Correcting Convolutional Codes
Information and Control 16(3): 225-230 (1970) |