-
2
-
-
85031713513
-
-
Ciphertext The RSA Newsletter
-
The Arcade Project: A Progress Report, Ciphertext The RSA Newsletter, Vol. 2, No. 1, 1994, p 6
-
(1994)
The Arcade Project: A Progress Report
, vol.2
, Issue.1
, pp. 6
-
-
-
3
-
-
85031745105
-
-
U. S. Patent, issued March 21, 1995, assigned to RSA Data Security, Inc., Redwood City, CA
-
U. S. Patent 500, 403, issued March 21, 1995, assigned to RSA Data Security, Inc., Redwood City, CA.
-
-
-
-
4
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Computing 13, pp. 850-863, 1984.
-
(1984)
SIAM J. Computing
, vol.13
, pp. 850-863
-
-
Blum, M.1
Micali, S.2
-
5
-
-
84957670625
-
Collusion secure fingerprinting far digital data
-
LNCS, Springer
-
D. Boneh and Shaw, Collusion Secure Fingerprinting far Digital Data, Proc. Advances in Cryptology - Crypto'95, LNCS 96, Springer, pp. 452-465, 1995. Full paper available: http://www cs.princeton edu/dabo/publications.html
-
(1995)
Proc. Advances in Cryptology - Crypto'95
, vol.96
, pp. 452-465
-
-
Boneh, D.1
Shaw2
-
6
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
J. Brassil, S. Low, N. F. Maxemchuck, and L. O'Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying, 13th Annual Joint Conference of the IEEE computer and Communication Societies, Proc 1III Info-Comm'94, pp. 1278-1287.
-
13th Annual Joint Conference of the IEEE Computer and Communication Societies, Proc 1III Info-Comm'94
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuck, N.F.3
O'Gorman, L.4
-
8
-
-
84985922619
-
Tracing traitors
-
LNCS, Springer
-
Chor B., A. Fiat and M. Naor, Tracing traitors, Advances in Cryptology - CRYPTO' 94, LNCS 839, Springer, pp. 257-270, 1994 (Full version available.)
-
(1994)
Advances in Cryptology - CRYPTO' 94
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
9
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor and S Goldwasser and S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, FOCS 85, 1985, pp. 383-395.
-
(1985)
FOCS
, vol.85
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
10
-
-
85031764497
-
-
manuscript
-
I Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Frequency Domain Watermarking for Multimedia, manuscript, 1995
-
(1995)
Secure Frequency Domain Watermarking for Multimedia
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
13
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
P. Feldman, A practical scheme for non-interactive verifiable secret sharing, FOCS 28, 1987, pp. 427-437.
-
(1987)
FOCS
, vol.28
, pp. 427-437
-
-
Feldman, P.1
-
15
-
-
85034864010
-
Towards a theory of software protection
-
Springer-Verlag
-
O. Goldreich, Towards a Theory of Software Protection, Advances in Cryptology - CRYPTO 1986, Springer-Verlag, 1987, pp. 426-439.
-
(1987)
Advances in Cryptology - CRYPTO 1986
, pp. 426-439
-
-
Goldreich, O.1
-
16
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, M. Micali, A. Wigderson, How to play any mental game, Proc. 19th ACM Symp. on Theory of Computing, 1987, pp. 218-229.
-
(1987)
Proc. 19th ACM Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, M.2
Wigderson, A.3
-
19
-
-
85031723092
-
-
US Patent, Inventors:, Co, and, Issued to IBM Corp 06/07/1994; Application Date:10/21/1992
-
US Patent No. 5, 319, 705: Method and system for multimedia access control enablement, Inventors: Halter, Bernard J., Le, An V., Co, Alphonse M., Johnson, Donald B., Matyas, Stephen M., Randall, James D., and Wilkins, John D, Issued to IBM Corp 06/07/1994; Application Date:10/21/1992
-
Method and System for Multimedia Access Control Enablement
-
-
Halter, B.J.1
Le, A.V.2
Alphonse, M.3
Johnson, D.B.4
Matyas, S.M.5
Randall, J.D.6
Wilkins, J.D.7
-
24
-
-
0024768554
-
On universal classes of fast high performance hash functions, their time-space tradeoff and their applications
-
A. Siegel, On universal classes of fast high performance hash functions, their time-space tradeoff and their applications, FOCS 1989, pp. 20-25
-
(1989)
FOCS
, pp. 20-25
-
-
Siegel, A.1
|