BibTeX records: Whitfield Diffie

download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/HughesD22,
  author       = {James P. Hughes and
                  Whitfield Diffie},
  title        = {The Challenges of IoT, TLS, and Random Number Generators in the Real
                  World: Bad random numbers are still with us and are proliferating
                  in modern systems},
  journal      = {{ACM} Queue},
  volume       = {20},
  number       = {3},
  pages        = {18--40},
  year         = {2022},
  url          = {https://doi.org/10.1145/3546933},
  doi          = {10.1145/3546933},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/HughesD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/22/DiffieH22,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  editor       = {Rebecca Slayton},
  title        = {New Directions in Cryptography},
  booktitle    = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin
                  Hellman},
  series       = {{ACM} Books},
  volume       = {42},
  pages        = {365--390},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549993.3550007},
  doi          = {10.1145/3549993.3550007},
  timestamp    = {Thu, 21 Sep 2023 15:19:45 +0200},
  biburl       = {https://dblp.org/rec/books/acm/22/DiffieH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/22/DiffieH22a,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  editor       = {Rebecca Slayton},
  title        = {Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard},
  booktitle    = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin
                  Hellman},
  series       = {{ACM} Books},
  volume       = {42},
  pages        = {391--414},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549993.3550008},
  doi          = {10.1145/3549993.3550008},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/acm/22/DiffieH22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/22/DiffieH22b,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  editor       = {Rebecca Slayton},
  title        = {Privacy and Authentication: An Introduction to Cryptography},
  booktitle    = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin
                  Hellman},
  series       = {{ACM} Books},
  volume       = {42},
  pages        = {431--514},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549993.3550010},
  doi          = {10.1145/3549993.3550010},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/acm/22/DiffieH22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/Diffie16,
  author       = {Whitfield Diffie},
  editor       = {Balaji Krishnapuram and
                  Mohak Shah and
                  Alexander J. Smola and
                  Charu C. Aggarwal and
                  Dou Shen and
                  Rajeev Rastogi},
  title        = {The Evolving Meaning of Information Security},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, San Francisco, CA, USA, August
                  13-17, 2016},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939672.2949031},
  doi          = {10.1145/2939672.2949031},
  timestamp    = {Tue, 06 Nov 2018 16:59:37 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/Diffie16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLR11,
  author       = {Steven M. Bellovin and
                  Scott O. Bradner and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford},
  title        = {As simple as possible - but not more so},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {8},
  pages        = {30--33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978542.1978553},
  doi          = {10.1145/1978542.1978553},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DiffieL09,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Communications surveillance: privacy and security at risk},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {11},
  pages        = {42--47},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592761.1592776},
  doi          = {10.1145/1592761.1592776},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DiffieL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/DiffieL09,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Communications Surveillance: Privacy and Security at Risk},
  journal      = {{ACM} Queue},
  volume       = {7},
  number       = {8},
  pages        = {10},
  year         = {2009},
  url          = {https://doi.org/10.1145/1613128.1613130},
  doi          = {10.1145/1613128.1613130},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/DiffieL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Diffie08,
  author       = {Whitfield Diffie},
  title        = {Information security: 50 years behind, 50 years ahead},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {1},
  pages        = {55--57},
  year         = {2008},
  url          = {https://doi.org/10.1145/1327452.1327478},
  doi          = {10.1145/1327452.1327478},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Diffie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Diffie08,
  author       = {Whitfield Diffie},
  title        = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who
                  Are You? Identification, Deception, and Surveillance in Early Modern
                  Europe} by Valentin Groebner},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {368--369},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802215077},
  doi          = {10.1080/01611190802215077},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBBDDEV08,
  author       = {Steven M. Bellovin and
                  Terry V. Benzel and
                  Bob Blakley and
                  Dorothy E. Denning and
                  Whitfield Diffie and
                  Jeremy Epstein and
                  Paulo Ver{\'{\i}}ssimo},
  title        = {Information Assurance Technology Forecast 2008},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {16--23},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.13},
  doi          = {10.1109/MSP.2008.13},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBBDDEV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBDSNR08,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Jennifer Rexford},
  title        = {Risking Communications Security: Potential Hazards of the Protect
                  America Act},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {24--33},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.17},
  doi          = {10.1109/MSP.2008.17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/DiffieL08,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Privacy on the line: the politics of wiretapping and encryption},
  journal      = {{SIGACT} News},
  volume       = {39},
  number       = {4},
  pages        = {30--32},
  year         = {2008},
  url          = {https://doi.org/10.1145/1466390.1466397},
  doi          = {10.1145/1466390.1466397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/DiffieL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiffieL08,
  author       = {Whitfield Diffie and
                  George Ledin},
  title        = {{SMS4} Encryption Algorithm for Wireless Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiffieL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0021094,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Privacy on the line - the politics of wiretapping and encryption (updated
                  expanded ed.)},
  publisher    = {{MIT} Press},
  year         = {2007},
  url          = {http://mitpress.mit.edu/books/privacy-line},
  isbn         = {978-0-262-04240-6},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0021094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLRN07,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford and
                  Peter G. Neumann},
  title        = {Internal surveillance, external risks},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {12},
  pages        = {128},
  year         = {2007},
  url          = {https://doi.org/10.1145/1323688.1323717},
  doi          = {10.1145/1323688.1323717},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/Diffie07,
  author       = {Whitfield Diffie},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Cryptography: Past, Present and Future},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4804},
  pages        = {1529--1530},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76843-2\_29},
  doi          = {10.1007/978-3-540-76843-2\_29},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/Diffie07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Diffie06,
  author       = {Whitfield Diffie},
  title        = {Chattering about {SIGINT}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {1},
  pages        = {9},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.9},
  doi          = {10.1109/MSP.2006.9},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Diffie06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Diffie01,
  author       = {Whitfield Diffie},
  title        = {Ultimate cryptography},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {3},
  pages        = {84--86},
  year         = {2001},
  url          = {https://doi.org/10.1145/365181.365214},
  doi          = {10.1145/365181.365214},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Diffie01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/Diffie00,
  author       = {Whitfield Diffie},
  editor       = {Lorrie Faith Cranor},
  title        = {Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.545210},
  doi          = {10.1145/332186.545210},
  timestamp    = {Mon, 23 May 2022 11:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/Diffie00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/standardview/Diffie98,
  author       = {Whitfield Diffie},
  title        = {E-commerce and security},
  journal      = {{ACM} Stand.},
  volume       = {6},
  number       = {3},
  pages        = {116--117},
  year         = {1998},
  url          = {https://doi.org/10.1145/324042.324047},
  doi          = {10.1145/324042.324047},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/standardview/Diffie98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier},
  title        = {The risks of key recovery, key escrow, and trusted third-party encryption},
  journal      = {World Wide Web J.},
  volume       = {2},
  pages        = {241--257},
  year         = {1997},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BethD96,
  author       = {Thomas Beth and
                  Whitfield Diffie},
  title        = {Special Issue Dedicated to Gustavus J. Simmons - Foreword to this
                  issue},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {7--9},
  year         = {1996},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BethD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Diffie96,
  author       = {Whitfield Diffie},
  title        = {The National Security Establishment and the Development of Public-Key
                  Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {9--12},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018032210651},
  doi          = {10.1023/A:1018032210651},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Diffie96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LandauKBCDDLMNS94,
  author       = {Susan Landau and
                  Stephen T. Kent and
                  Clinton Brooks and
                  Scott Charney and
                  Dorothy E. Denning and
                  Whitfield Diffie and
                  Anthony Lauck and
                  Douglas Miller and
                  Peter G. Neumann and
                  David Sobel},
  title        = {Crypto Policy Perspectives},
  journal      = {Commun. {ACM}},
  volume       = {37},
  number       = {8},
  pages        = {115--121},
  year         = {1994},
  url          = {https://doi.org/10.1145/179606.179726},
  doi          = {10.1145/179606.179726},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/LandauKBCDDLMNS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/AzizD94,
  author       = {Ashar Aziz and
                  Whitfield Diffie},
  title        = {Privacy and authentication for wireless local area networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {25--31},
  year         = {1994},
  url          = {https://doi.org/10.1109/98.295357},
  doi          = {10.1109/98.295357},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/AzizD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DiffieOW92,
  author       = {Whitfield Diffie and
                  Paul C. van Oorschot and
                  Michael J. Wiener},
  title        = {Authentication and Authenticated Key Exchanges},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {107--125},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124891},
  doi          = {10.1007/BF00124891},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DiffieOW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/DenningBBGDB92,
  author       = {Dorothy E. Denning and
                  James Bidzos and
                  David Bellin and
                  John Gilmore and
                  Whitfield Diffie and
                  John Perry Barlow},
  editor       = {Lance J. Hoffman},
  title        = {Who holds the keys?},
  booktitle    = {Proceedings of the Second Conference on Computers, Freedom and Privacy,
                  {CFP} 1992, Washington, D.C., USA, March 18-20, 1992},
  pages        = {133--147},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/142652.142672},
  doi          = {10.1145/142652.142672},
  timestamp    = {Fri, 20 May 2022 14:01:59 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/DenningBBGDB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Diffie89,
  author       = {Whitfield Diffie},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {The Adolescence of Public-Key Cryptography (Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {2},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_1},
  doi          = {10.1007/3-540-46885-4\_1},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Diffie89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Diffie88,
  author       = {Whitfield Diffie},
  title        = {The first ten years of public-key cryptography},
  journal      = {Proc. {IEEE}},
  volume       = {76},
  number       = {5},
  pages        = {560--577},
  year         = {1988},
  url          = {https://doi.org/10.1109/5.4442},
  doi          = {10.1109/5.4442},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Diffie88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SteerSDW88,
  author       = {David G. Steer and
                  Leo Strawczynski and
                  Whitfield Diffie and
                  Michael J. Wiener},
  editor       = {Shafi Goldwasser},
  title        = {A Secure Audio Teleconference System},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {520--528},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_37},
  doi          = {10.1007/0-387-34799-2\_37},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SteerSDW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Diffie85,
  author       = {Whitfield Diffie},
  editor       = {Hugh C. Williams},
  title        = {Security for the DoD Transmission Control Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_11},
  doi          = {10.1007/3-540-39799-X\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Diffie85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FellD85,
  author       = {Harriet J. Fell and
                  Whitfield Diffie},
  editor       = {Hugh C. Williams},
  title        = {Analysis of a Public Key Approach Based on Polynomial Substitution},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {340--349},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_24},
  doi          = {10.1007/3-540-39799-X\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FellD85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Diffie83,
  author       = {Whitfield Diffie},
  title        = {Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted
                  Systems},
  booktitle    = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 25-27, 1983},
  pages        = {136--138},
  publisher    = {{IEEE} Computer Society},
  year         = {1983},
  url          = {https://doi.org/10.1109/SP.1983.10021},
  doi          = {10.1109/SP.1983.10021},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Diffie83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Diffie82,
  author       = {Whitfield Diffie},
  title        = {Cryptographic technology: fifteen year forecast},
  journal      = {{SIGACT} News},
  volume       = {14},
  number       = {4},
  pages        = {38--57},
  year         = {1982},
  url          = {https://doi.org/10.1145/1008902.1008903},
  doi          = {10.1145/1008902.1008903},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Diffie82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Diffie81,
  author       = {Whitfield Diffie},
  editor       = {Allen Gersho},
  title        = {Cryptography, the Next Two Decades},
  booktitle    = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
                  Workshop on Communications Security, Santa Barbara, California, USA,
                  August 24-26, 1981},
  pages        = {84--108},
  publisher    = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
                  No 82-04},
  year         = {1981},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Diffie81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DiffieKDGS81,
  author       = {Whitfield Diffie and
                  Melville Klein and
                  Michael L. Dertouzos and
                  Andrew Gleason and
                  Dean Smith},
  editor       = {Allen Gersho},
  title        = {National Security and Commercial Security: Division of Responsibility},
  booktitle    = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
                  Workshop on Communications Security, Santa Barbara, California, USA,
                  August 24-26, 1981},
  pages        = {154--156},
  publisher    = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
                  No 82-04},
  year         = {1981},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DiffieKDGS81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DiffieH77,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  title        = {Special Feature Exhaustive Cryptanalysis of the {NBS} Data Encryption
                  Standard},
  journal      = {Computer},
  volume       = {10},
  number       = {6},
  pages        = {74--84},
  year         = {1977},
  url          = {https://doi.org/10.1109/C-M.1977.217750},
  doi          = {10.1109/C-M.1977.217750},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DiffieH77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DiffieH76,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  title        = {New directions in cryptography},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {22},
  number       = {6},
  pages        = {644--654},
  year         = {1976},
  url          = {https://doi.org/10.1109/TIT.1976.1055638},
  doi          = {10.1109/TIT.1976.1055638},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DiffieH76.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/DiffieH76,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  title        = {Multiuser cryptographic techniques},
  booktitle    = {American Federation of Information Processing Societies: 1976 National
                  Computer Conference, 7-10 June 1976, New York, NY, {USA}},
  series       = {{AFIPS} Conference Proceedings},
  volume       = {45},
  pages        = {109--112},
  publisher    = {{AFIPS} Press},
  year         = {1976},
  url          = {https://doi.org/10.1145/1499799.1499815},
  doi          = {10.1145/1499799.1499815},
  timestamp    = {Wed, 14 Apr 2021 16:50:07 +0200},
  biburl       = {https://dblp.org/rec/conf/afips/DiffieH76.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics