Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Whitfield Diffie
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our pockets: the risks of client-side scanning}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyad020}, doi = {10.1093/CYBSEC/TYAD020}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/HughesD22, author = {James P. Hughes and Whitfield Diffie}, title = {The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems}, journal = {{ACM} Queue}, volume = {20}, number = {3}, pages = {18--40}, year = {2022}, url = {https://doi.org/10.1145/3546933}, doi = {10.1145/3546933}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/HughesD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/22/DiffieH22, author = {Whitfield Diffie and Martin E. Hellman}, editor = {Rebecca Slayton}, title = {New Directions in Cryptography}, booktitle = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman}, series = {{ACM} Books}, volume = {42}, pages = {365--390}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549993.3550007}, doi = {10.1145/3549993.3550007}, timestamp = {Thu, 21 Sep 2023 15:19:45 +0200}, biburl = {https://dblp.org/rec/books/acm/22/DiffieH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/22/DiffieH22a, author = {Whitfield Diffie and Martin E. Hellman}, editor = {Rebecca Slayton}, title = {Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard}, booktitle = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman}, series = {{ACM} Books}, volume = {42}, pages = {391--414}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549993.3550008}, doi = {10.1145/3549993.3550008}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/acm/22/DiffieH22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/22/DiffieH22b, author = {Whitfield Diffie and Martin E. Hellman}, editor = {Rebecca Slayton}, title = {Privacy and Authentication: An Introduction to Cryptography}, booktitle = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman}, series = {{ACM} Books}, volume = {42}, pages = {431--514}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549993.3550010}, doi = {10.1145/3549993.3550010}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/acm/22/DiffieH22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07450, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our Pockets: The Risks of Client-Side Scanning}, journal = {CoRR}, volume = {abs/2110.07450}, year = {2021}, url = {https://arxiv.org/abs/2110.07450}, eprinttype = {arXiv}, eprint = {2110.07450}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/Diffie16, author = {Whitfield Diffie}, editor = {Balaji Krishnapuram and Mohak Shah and Alexander J. Smola and Charu C. Aggarwal and Dou Shen and Rajeev Rastogi}, title = {The Evolving Meaning of Information Security}, booktitle = {Proceedings of the 22nd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016}, pages = {5}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939672.2949031}, doi = {10.1145/2939672.2949031}, timestamp = {Tue, 06 Nov 2018 16:59:37 +0100}, biburl = {https://dblp.org/rec/conf/kdd/Diffie16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AbelsonABBBDGGL15, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats}, journal = {Commun. {ACM}}, volume = {58}, number = {10}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1145/2814825}, doi = {10.1145/2814825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLR11, author = {Steven M. Bellovin and Scott O. Bradner and Whitfield Diffie and Susan Landau and Jennifer Rexford}, title = {As simple as possible - but not more so}, journal = {Commun. {ACM}}, volume = {54}, number = {8}, pages = {30--33}, year = {2011}, url = {https://doi.org/10.1145/1978542.1978553}, doi = {10.1145/1978542.1978553}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DiffieL09, author = {Whitfield Diffie and Susan Landau}, title = {Communications surveillance: privacy and security at risk}, journal = {Commun. {ACM}}, volume = {52}, number = {11}, pages = {42--47}, year = {2009}, url = {https://doi.org/10.1145/1592761.1592776}, doi = {10.1145/1592761.1592776}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DiffieL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/DiffieL09, author = {Whitfield Diffie and Susan Landau}, title = {Communications Surveillance: Privacy and Security at Risk}, journal = {{ACM} Queue}, volume = {7}, number = {8}, pages = {10}, year = {2009}, url = {https://doi.org/10.1145/1613128.1613130}, doi = {10.1145/1613128.1613130}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/DiffieL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Diffie08, author = {Whitfield Diffie}, title = {Information security: 50 years behind, 50 years ahead}, journal = {Commun. {ACM}}, volume = {51}, number = {1}, pages = {55--57}, year = {2008}, url = {https://doi.org/10.1145/1327452.1327478}, doi = {10.1145/1327452.1327478}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Diffie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Diffie08, author = {Whitfield Diffie}, title = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who Are You? Identification, Deception, and Surveillance in Early Modern Europe} by Valentin Groebner}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {368--369}, year = {2008}, url = {https://doi.org/10.1080/01611190802215077}, doi = {10.1080/01611190802215077}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBBDDEV08, author = {Steven M. Bellovin and Terry V. Benzel and Bob Blakley and Dorothy E. Denning and Whitfield Diffie and Jeremy Epstein and Paulo Ver{\'{\i}}ssimo}, title = {Information Assurance Technology Forecast 2008}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {16--23}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.13}, doi = {10.1109/MSP.2008.13}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBBDDEV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBDSNR08, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Peter G. Neumann and Jennifer Rexford}, title = {Risking Communications Security: Potential Hazards of the Protect America Act}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {24--33}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.17}, doi = {10.1109/MSP.2008.17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/DiffieL08, author = {Whitfield Diffie and Susan Landau}, title = {Privacy on the line: the politics of wiretapping and encryption}, journal = {{SIGACT} News}, volume = {39}, number = {4}, pages = {30--32}, year = {2008}, url = {https://doi.org/10.1145/1466390.1466397}, doi = {10.1145/1466390.1466397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/DiffieL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiffieL08, author = {Whitfield Diffie and George Ledin}, title = {{SMS4} Encryption Algorithm for Wireless Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2008}, url = {http://eprint.iacr.org/2008/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiffieL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0021094, author = {Whitfield Diffie and Susan Landau}, title = {Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.)}, publisher = {{MIT} Press}, year = {2007}, url = {http://mitpress.mit.edu/books/privacy-line}, isbn = {978-0-262-04240-6}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0021094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLRN07, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Jennifer Rexford and Peter G. Neumann}, title = {Internal surveillance, external risks}, journal = {Commun. {ACM}}, volume = {50}, number = {12}, pages = {128}, year = {2007}, url = {https://doi.org/10.1145/1323688.1323717}, doi = {10.1145/1323688.1323717}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/Diffie07, author = {Whitfield Diffie}, editor = {Robert Meersman and Zahir Tari}, title = {Cryptography: Past, Present and Future}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1529--1530}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_29}, doi = {10.1007/978-3-540-76843-2\_29}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/Diffie07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Diffie06, author = {Whitfield Diffie}, title = {Chattering about {SIGINT}}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {1}, pages = {9}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.9}, doi = {10.1109/MSP.2006.9}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Diffie06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Diffie01, author = {Whitfield Diffie}, title = {Ultimate cryptography}, journal = {Commun. {ACM}}, volume = {44}, number = {3}, pages = {84--86}, year = {2001}, url = {https://doi.org/10.1145/365181.365214}, doi = {10.1145/365181.365214}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Diffie01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/Diffie00, author = {Whitfield Diffie}, editor = {Lorrie Faith Cranor}, title = {Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {10}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.545210}, doi = {10.1145/332186.545210}, timestamp = {Mon, 23 May 2022 11:52:54 +0200}, biburl = {https://dblp.org/rec/conf/cfp/Diffie00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/standardview/Diffie98, author = {Whitfield Diffie}, title = {E-commerce and security}, journal = {{ACM} Stand.}, volume = {6}, number = {3}, pages = {116--117}, year = {1998}, url = {https://doi.org/10.1145/324042.324047}, doi = {10.1145/324042.324047}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/standardview/Diffie98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier}, title = {The risks of key recovery, key escrow, and trusted third-party encryption}, journal = {World Wide Web J.}, volume = {2}, pages = {241--257}, year = {1997}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BethD96, author = {Thomas Beth and Whitfield Diffie}, title = {Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {7--9}, year = {1996}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BethD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Diffie96, author = {Whitfield Diffie}, title = {The National Security Establishment and the Development of Public-Key Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {9--12}, year = {1996}, url = {https://doi.org/10.1023/A:1018032210651}, doi = {10.1023/A:1018032210651}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Diffie96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LandauKBCDDLMNS94, author = {Susan Landau and Stephen T. Kent and Clinton Brooks and Scott Charney and Dorothy E. Denning and Whitfield Diffie and Anthony Lauck and Douglas Miller and Peter G. Neumann and David Sobel}, title = {Crypto Policy Perspectives}, journal = {Commun. {ACM}}, volume = {37}, number = {8}, pages = {115--121}, year = {1994}, url = {https://doi.org/10.1145/179606.179726}, doi = {10.1145/179606.179726}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/LandauKBCDDLMNS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/AzizD94, author = {Ashar Aziz and Whitfield Diffie}, title = {Privacy and authentication for wireless local area networks}, journal = {{IEEE} Wirel. Commun.}, volume = {1}, number = {1}, pages = {25--31}, year = {1994}, url = {https://doi.org/10.1109/98.295357}, doi = {10.1109/98.295357}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/AzizD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DiffieOW92, author = {Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener}, title = {Authentication and Authenticated Key Exchanges}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {107--125}, year = {1992}, url = {https://doi.org/10.1007/BF00124891}, doi = {10.1007/BF00124891}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DiffieOW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/DenningBBGDB92, author = {Dorothy E. Denning and James Bidzos and David Bellin and John Gilmore and Whitfield Diffie and John Perry Barlow}, editor = {Lance J. Hoffman}, title = {Who holds the keys?}, booktitle = {Proceedings of the Second Conference on Computers, Freedom and Privacy, {CFP} 1992, Washington, D.C., USA, March 18-20, 1992}, pages = {133--147}, publisher = {{ACM}}, year = {1992}, url = {https://doi.org/10.1145/142652.142672}, doi = {10.1145/142652.142672}, timestamp = {Fri, 20 May 2022 14:01:59 +0200}, biburl = {https://dblp.org/rec/conf/cfp/DenningBBGDB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Diffie89, author = {Whitfield Diffie}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {The Adolescence of Public-Key Cryptography (Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {2}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_1}, doi = {10.1007/3-540-46885-4\_1}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Diffie89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Diffie88, author = {Whitfield Diffie}, title = {The first ten years of public-key cryptography}, journal = {Proc. {IEEE}}, volume = {76}, number = {5}, pages = {560--577}, year = {1988}, url = {https://doi.org/10.1109/5.4442}, doi = {10.1109/5.4442}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Diffie88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SteerSDW88, author = {David G. Steer and Leo Strawczynski and Whitfield Diffie and Michael J. Wiener}, editor = {Shafi Goldwasser}, title = {A Secure Audio Teleconference System}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {520--528}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_37}, doi = {10.1007/0-387-34799-2\_37}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SteerSDW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Diffie85, author = {Whitfield Diffie}, editor = {Hugh C. Williams}, title = {Security for the DoD Transmission Control Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {108--127}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_11}, doi = {10.1007/3-540-39799-X\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Diffie85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FellD85, author = {Harriet J. Fell and Whitfield Diffie}, editor = {Hugh C. Williams}, title = {Analysis of a Public Key Approach Based on Polynomial Substitution}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {340--349}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_24}, doi = {10.1007/3-540-39799-X\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FellD85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Diffie83, author = {Whitfield Diffie}, title = {Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems}, booktitle = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983}, pages = {136--138}, publisher = {{IEEE} Computer Society}, year = {1983}, url = {https://doi.org/10.1109/SP.1983.10021}, doi = {10.1109/SP.1983.10021}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Diffie83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Diffie82, author = {Whitfield Diffie}, title = {Cryptographic technology: fifteen year forecast}, journal = {{SIGACT} News}, volume = {14}, number = {4}, pages = {38--57}, year = {1982}, url = {https://doi.org/10.1145/1008902.1008903}, doi = {10.1145/1008902.1008903}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Diffie82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Diffie81, author = {Whitfield Diffie}, editor = {Allen Gersho}, title = {Cryptography, the Next Two Decades}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {84--108}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Diffie81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DiffieKDGS81, author = {Whitfield Diffie and Melville Klein and Michael L. Dertouzos and Andrew Gleason and Dean Smith}, editor = {Allen Gersho}, title = {National Security and Commercial Security: Division of Responsibility}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {154--156}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DiffieKDGS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DiffieH77, author = {Whitfield Diffie and Martin E. Hellman}, title = {Special Feature Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard}, journal = {Computer}, volume = {10}, number = {6}, pages = {74--84}, year = {1977}, url = {https://doi.org/10.1109/C-M.1977.217750}, doi = {10.1109/C-M.1977.217750}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DiffieH77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DiffieH76, author = {Whitfield Diffie and Martin E. Hellman}, title = {New directions in cryptography}, journal = {{IEEE} Trans. Inf. Theory}, volume = {22}, number = {6}, pages = {644--654}, year = {1976}, url = {https://doi.org/10.1109/TIT.1976.1055638}, doi = {10.1109/TIT.1976.1055638}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DiffieH76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/afips/DiffieH76, author = {Whitfield Diffie and Martin E. Hellman}, title = {Multiuser cryptographic techniques}, booktitle = {American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, {USA}}, series = {{AFIPS} Conference Proceedings}, volume = {45}, pages = {109--112}, publisher = {{AFIPS} Press}, year = {1976}, url = {https://doi.org/10.1145/1499799.1499815}, doi = {10.1145/1499799.1499815}, timestamp = {Wed, 14 Apr 2021 16:50:07 +0200}, biburl = {https://dblp.org/rec/conf/afips/DiffieH76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.