default search action
George I. Davida
Person information
- affiliation: University of Wisconsin-Milwaukee, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c27]George I. Davida, Yair Frankel:
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage. Cryptography and Security 2012: 465-473
2000 – 2009
- 2009
- [j14]George I. Davida, Bruce E. Litow, Guangwu Xu:
Fast arithmetics using Chinese remaindering. Inf. Process. Lett. 109(13): 660-662 (2009) - 2008
- [i3]George I. Davida, Bruce E. Litow, Guangwu Xu:
Fast Arithmetics Using Chinese Remaindering. CoRR abs/0806.1722 (2008) - 2007
- [i2]George I. Davida, Jeremy A. Hansen:
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms. IACR Cryptol. ePrint Arch. 2007: 240 (2007) - 2005
- [c26]George I. Davida, Jeremy A. Hansen:
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. ICETE 2005: 364-367 - [c25]George I. Davida, Jon Peccarelli:
Hardening windows systems. ICETE 2005: 368-371 - 2002
- [c24]Mark Chapman, George I. Davida:
Plausible Deniability Using Automated Linguistic Stegonagraphy. InfraSec 2002: 276-287 - [e3]George I. Davida, Yair Frankel, Owen Rees:
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings. Lecture Notes in Computer Science 2437, Springer 2002, ISBN 3-540-44309-6 [contents] - 2001
- [j13]Andrew Chiu, George I. Davida, Bruce E. Litow:
Division in logspace-uniform NC1. RAIRO Theor. Informatics Appl. 35(3): 259-275 (2001) - [c23]Mark Chapman, George I. Davida, Marc Rennhard:
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. ISC 2001: 156-165 - [e2]George I. Davida, Yair Frankel:
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings. Lecture Notes in Computer Science 2200, Springer 2001, ISBN 3-540-42662-0 [contents]
1990 – 1999
- 1999
- [c22]George I. Davida, Yair Frankel:
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. IMACC 1999: 104-113 - 1998
- [c21]George I. Davida, Yair Frankel, Brian J. Matt:
On Enabling Secure Applications Through Off-Line Biometric Identification. S&P 1998: 148-157 - [e1]Eiji Okamoto, George I. Davida, Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1396, Springer 1998, ISBN 3-540-64382-6 [contents] - 1997
- [c20]George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung:
Anonymity Control in E-Cash Systems. Financial Cryptography 1997: 1-16 - [c19]Mark Chapman, George I. Davida:
Hiding the Hidden: A software system for concealing ciphertext as innocuous text. ICICS 1997: 335-345 - [c18]George I. Davida, René Peralta:
High-Speed Cryptography. ISW 1997: 116-120 - 1992
- [j12]George I. Davida, Yvo Desmedt:
Passports and visas versus IDs. Comput. Secur. 11(3): 253-258 (1992) - 1991
- [j11]George I. Davida, Bruce E. Litow:
Fast Parallel Arithmetic via Modular Representation. SIAM J. Comput. 20(4): 756-765 (1991) - 1990
- [j10]George I. Davida, Yvo Desmedt:
Cryptography Based Data Security. Adv. Comput. 30: 171-222 (1990) - [c17]George I. Davida, Yvo Desmedt, René Peralta:
On the Importance of Memory Resources in the Security of Key Exchange Protocols. EUROCRYPT 1990: 11-15
1980 – 1989
- 1989
- [c16]George I. Davida, Yvo Desmedt, René Peralta:
A Key Distribution System Based On Any One-Way Function (Extended Abstract). EUROCRYPT 1989: 75-79 - [c15]George I. Davida, Yvo Desmedt, Brian J. Matt:
Defending Systems against Viruses through Cryptographic Authentication. S&P 1989: 312-318 - 1988
- [c14]Bruce E. Litow, George I. Davida:
O(log(n)) Parallel Time Finite Field Inversion. AWOC 1988: 74-80 - [c13]George I. Davida, Yvo Desmedt:
Passports and Visas Versus IDS (Extended Abstract). EUROCRYPT 1988: 183-188 - 1987
- [c12]George I. Davida, Brian J. Matt:
Arbitration in Tamper Proof Systems. CRYPTO 1987: 216-222 - [c11]George I. Davida, Frank B. Dancs:
A Crypto-Engine. CRYPTO 1987: 257-268 - [c10]George I. Davida, Gilbert G. Walter:
A Public Key Analog Cryptosystem. EUROCRYPT 1987: 143-147 - 1986
- [i1]George I. Davida, Yi-Shiung Yeh:
Multilevel Cryptosecure Relational Database. EUROCRYPT 1986: 50 - 1984
- [c9]George I. Davida, Jon Livesey:
Disability Independent Computer Systems for the Handicapped. COMPCON 1984: 345-352 - 1982
- [c8]George I. Davida, Yi-Shiung Yeh:
Cryptographic Relational Algebra. S&P 1982: 111-116 - 1981
- [j9]George I. Davida:
The Case against restraints on Non-Governmental Research in Cryptography. Cryptologia 5(3): 143-148 (1981) - [j8]George I. Davida, David L. Wells, John B. Kam:
A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6(2): 312-328 (1981) - [c7]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Multilevel Secure Distributed System. ICDCS 1981: 308-312 - [c6]George I. Davida, Jon Livesey:
The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture. S&P 1981: 133-140 - 1980
- [c5]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Protecting Shared Cryptographic Keys. S&P 1980: 100-102 - [c4]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System. S&P 1980: 137-144
1970 – 1979
- 1979
- [j7]John B. Kam, George I. Davida:
Structured Design of Substitution-Permutation Encryption Networks. IEEE Trans. Computers 28(10): 747-753 (1979) - 1978
- [j6]George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells:
Database Security. IEEE Trans. Software Eng. 4(6): 531-533 (1978) - [c3]George I. Davida, David L. Wells, John B. Kam:
Security and Privacy. COMPSAC 1978: 194-203 - [c2]George I. Davida:
Security and Privacy. VLDB 1978: 54 - [c1]George I. Davida:
Privacy, Security and Databases: Any Solutions? VLDB Surveys 1978: 249-251 - 1977
- [j5]Bruce H. Barnes, George I. Davida, Richard A. DeMillo, Larry Landweber, Harold S. Stone:
Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where. Computer 10(12): 106-108 (1977) - 1975
- [j4]George I. Davida, J. Cowles:
A new error-locating polynomial for decoding of BCH codes (Corresp.). IEEE Trans. Inf. Theory 21(2): 235-236 (1975) - 1974
- [j3]Yogesh J. Shah, George I. Davida, Michael K. McCarthy:
Optimum Featurs and Graph Isomorphism. IEEE Trans. Syst. Man Cybern. 4(3): 313-319 (1974) - 1972
- [j2]George I. Davida, Sudhakar M. Reddy:
Forward-Error Correction with Decision Feedback. Inf. Control. 21(2): 117-133 (1972) - 1970
- [j1]Sudhakar M. Reddy, George I. Davida, John P. Robinson:
A Class of High-Rate Double-Error-Correcting Convolutional Codes. Inf. Control. 16(3): 225-230 (1970)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint