Secure and efficient key management in mobile ad hoc networks B Wu, J Wu, EB Fernandez, S Magliveras 19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005 | 337 | 2005 |
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups SS Magliveras, DR Stinson, T Van Trung Journal of cryptology 15 (4), 285-297, 2002 | 174 | 2002 |
Lossless compression of multispectral image data ND Memon, K Sayood, SS Magliveras IEEE Transactions on Geoscience and Remote Sensing 32 (2), 282-289, 1994 | 145 | 1994 |
Short paper: Enhanced 1-d chaotic key-based algorithm for image encryption D Socek, S Li, SS Magliveras, B Furht First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 106 | 2005 |
Routing techniques in wireless ad hoc networks classification and comparison X Zou, B Ramamurthy, S Magliveras Proceedings of the Sixth World Multiconference on Systemics, Cybernetics and …, 2002 | 102 | 2002 |
A cryptosystem from logarithmic signatures of finite groups SS Magliveras Proceedings of the 29th Midwest Symposium on Circuits and Systems 972975, 1986 | 101 | 1986 |
Secure group communications over data networks X Zou, B Ramamurthy, SS Magliveras Springer Science & Business Media, 2004 | 100 | 2004 |
Algebraic properties of cryptosystem PGM SS Magliveras, ND Memon Journal of cryptology 5, 167-183, 1992 | 97 | 1992 |
A public key cryptosystem based on non-abelian finite groups W Lempken, T van Tran, SS Magliveras, W Wei Journal of Cryptology 22, 62-74, 2009 | 95 | 2009 |
Some recursive constructions for perfect hash families M Atici, SS Magliveras, DR Stinson, WD Wei Journal of Combinatorial Designs 4 (5), 353-363, 1996 | 95 | 1996 |
Block sorting and compression Z Arnavut, SS Magliveras Proceedings DCC'97. Data Compression Conference, 181-190, 1997 | 71 | 1997 |
Compression independent reversible encryption for privacy in video surveillance P Carrillo, H Kalva, S Magliveras EURASIP Journal on Information Security 2009 (1), 1-13, 2010 | 68 | 2010 |
Compression independent object encryption for ensuring privacy in video surveillance P Carrillo, H Kalva, S Magliveras 2008 IEEE International Conference on Multimedia and Expo, 273-276, 2008 | 66 | 2008 |
Chinese remainder theorem based hierarchical access control for secure group communication X Zou, B Ramamurthy, SS Magliveras Information and Communications Security: Third International Conference …, 2001 | 65 | 2001 |
New approaches to encryption and steganography for digital videos D Socek, H Kalva, SS Magliveras, O Marques, D Culibrk, B Furht Multimedia Systems 13, 191-204, 2007 | 58 | 2007 |
The subgroup structure of the Higman-Sims simple group SS Magliveras Bulletin of the American Mathematical Society 77 (4), 535-539, 1971 | 57 | 1971 |
On public-key cryptosystems based on combinatorial group theory JC Birget, SS Magliveras, M Sramka Cryptology ePrint Archive, 2005 | 54 | 2005 |
Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2l SS Magliveras, T Horvath US Patent 6,038,317, 2000 | 54 | 2000 |
Digital video encryption algorithms based on correlation-preserving permutations D Socek, S Magliveras, D Ćulibrk, O Marques, H Kalva, B Furht EURASIP Journal on Information Security 2007, 1-15, 2007 | 46 | 2007 |
Cryptanalysis of the Tillich–Zémor hash function M Grassl, I Ilić, S Magliveras, R Steinwandt Journal of cryptology 24 (1), 148-156, 2011 | 45 | 2011 |