Two-phase cryptographic key recovery system R Gennaro, DB Johnson, PA Karger, SM Matyas Jr, M Peyravian, ... US Patent 5,937,066, 1999 | 340 | 1999 |
Secure data storage and retrieval with key management and user authentication SM Matyas Jr, M Peyravian, AL Roginsky, N Zunic US Patent 6,947,556, 2005 | 311 | 2005 |
MARS-a candidate cipher for AES C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ... NIST AES Proposal 268, 80, 1998 | 297 | 1998 |
Applying blocking measures progressively to malicious network traffic B Carpenter, K Himberger, C Jeffries, M Peyravian US Patent App. 11/283,380, 2006 | 284 | 2006 |
Method of responding to a truncated secure session attack BE Carpenter, KD Himberger, CD Jeffries, M Peyravian US Patent 7,464,404, 2008 | 272 | 2008 |
Biometric based multi-party authentication SM Matyas Jr, M Peyravian, AL Roginsky, N Zunic US Patent 6,697,947, 2004 | 254 | 2004 |
Secure data storage and retrieval in a client-server environment SM Matyas Jr, M Peyravian, AL Roginsky, N Zunic US Patent 7,010,689, 2006 | 214 | 2006 |
Transmission order based selective repeat data transmission error recovery system and method JG Dudley, M Peyravian US Patent 5,754,754, 1998 | 198 | 1998 |
Methods for protecting password transmission M Peyravian, N Zunic Computers & Security 19 (5), 466-469, 2000 | 186 | 2000 |
Method and apparatus for verifiably providing key recovery information in a cryptographic system R Gennaro, PA Karger, SM Matyas Jr, M Peyravian, DR Safford, N Zunic US Patent 5,907,618, 1999 | 159 | 1999 |
Generating user-dependent keys and random numbers SM Matyas Jr, M Peyravian, AL Roginsky, N Zunic US Patent 6,687,375, 2004 | 145 | 2004 |
Protection of biometric data via key-dependent sampling SM Matyas Jr, M Peyravian US Patent 6,507,912, 2003 | 145 | 2003 |
IBM PowerNP network processor: Hardware, software, and applications JR Allen, BM Bass, C Basso, RH Boivie, JL Calvignac, GT Davis, ... IBM Journal of research and development 47 (2.3), 177-193, 2003 | 133 | 2003 |
Method and apparatus for secure password transmission and password changes M Peyravian, N Zunic US Patent 6,826,686, 2004 | 131 | 2004 |
The microarchitecture of the synergistic processor for a cell processor B Flachs, S Asano, SH Dhong, HP Hofstee, G Gervais, R Kim, T Le, P Liu, ... IEEE Journal of Solid-State Circuits 41 (1), 63-70, 2005 | 116 | 2005 |
Synchronization of encryption/decryption keys in a data communication network JP Gray, RO Onvural, M Peyravian US Patent 5,805,705, 1998 | 114 | 1998 |
Method and system for password protection of a data processing system that permit a user-selected password to be recovered DC Challener, M Peyravian, RA Resnick US Patent 6,668,323, 2003 | 101 | 2003 |
Efficient method for providing secure remote access CD Jeffries, M Peyravian US Patent 7,434,050, 2008 | 98 | 2008 |
Decentralized systems methods and computer program products for sending secure messages among a group of nodes M Peyravian, SM Matyas Jr, N Zunic US Patent 6,363,154, 2002 | 94 | 2002 |
System and method to track inventory using RFID tags KD Himberger, CD Jeffries, M Peyravian US Patent 7,348,886, 2008 | 90 | 2008 |