WorldCat Identities

Simmons, Gustavus J.

Overview
Works: 23 works in 72 publications in 2 languages and 1,257 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author, Other
Classifications: QA76.9.A25, 005.82
Publication Timeline
.
Most widely held works by Gustavus J Simmons
Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report by Thomas Beth( Book )

15 editions published in 1992 in English and held by 329 WorldCat member libraries worldwide

This report on the state of the art and future directions of public-key cryptography is published in accordance with the terms of reference of the European Institute for System Security (EISS). The EISS was founded in 1988 by cabinet resolution of the state government of Baden-W}rttemberg and its basic task is scientific research and knowledge transfer in the field of security in telecommunications and computer and information systems. This report gives the results of an EISS workshop on public-keycryptography and contains seven chapters: an introduction, the scope of the workshop, the topics chosen, classification and description of the most prominent public-key systems, the dependence of public-key cryptography on computational number theory, mistakes and problems with public-key systems, and a projection of needs and requirements for public-key systems. It is addressed to all members of the computer science community: systems developers, researchers, decision makers, standardization committees, patent offices, and users and customers of secure computer systems
Contemporary cryptology : the science of information integrity by Gustavus J Simmons( Book )

19 editions published between 1991 and 1999 in English and Undetermined and held by 328 WorldCat member libraries worldwide

Secure communications and asymmetric cryptosystems( Book )

8 editions published in 1982 in 3 languages and held by 215 WorldCat member libraries worldwide

Bogen beskriver udviklingen af assymetrisk kryptografi, nye direktiver på området og sikker kommunikation over usikre kanaler
An application of maximum-minimum distance circuits on hybercubes (to pseudo-color graphics displays) by Gustavus J Simmons( Book )

1 edition published in 1978 in English and held by 58 WorldCat member libraries worldwide

An investigation of exact solutions for two-dimensional steady irrotational isentropic flow of a polytropic gas by Gustavus J Simmons( Book )

3 editions published in 1958 in English and held by 5 WorldCat member libraries worldwide

Oscillator strengths of excited spectral lines with astrophysical applications by Gustavus J Simmons( Book )

4 editions published in 1981 in English and held by 5 WorldCat member libraries worldwide

A mathematical model for an associative memory by Gustavus J Simmons( Book )

2 editions published in 1963 in English and held by 5 WorldCat member libraries worldwide

An algorithm for the calculation of a class of fixed points for serial linear systems by Gustavus J Simmons( Book )

2 editions published in 1964 in English and held by 5 WorldCat member libraries worldwide

A study of the error involved in the near use of a radio interferometer by Gustavus J Simmons( Book )

2 editions published in 1959 in English and held by 3 WorldCat member libraries worldwide

Forward search as a cryptanalytic tool against a public key privacy channel by Gustavus J Simmons( Book )

2 editions published in 1982 in English and held by 2 WorldCat member libraries worldwide

Cryptanalysis and protocol failures by Gustavus J Simmons( )

1 edition published in 1994 in English and held by 1 WorldCat member library worldwide

How to insure that data acquired to verify treaty compliance are trustworthy by Gustavus J Simmons( )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

System security : Dagstuhl, 30.03-03.04.1992 by Thomas Beth( Book )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Special section on cryptology( )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

AN introduction to "off-line" Batch Jobs using the JCL language on the NEC 350 computer by Gustavus J Simmons( Book )

1 edition published in 1983 in English and held by 1 WorldCat member library worldwide

System security : 30.3. - 3.4.92 (9214)( Book )

2 editions published in 1992 in Undetermined and English and held by 1 WorldCat member library worldwide

Zero knowledge proofs of identify and veracity of transaction receipts by Gustavus J Simmons( Book )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

A combinatorial analysis of finite minimal uniform covers by Gustavus J Simmons( )

1 edition published in 1969 in English and held by 1 WorldCat member library worldwide

A generic classification for teaching machines by Gustavus J Simmons( Book )

1 edition published in 1965 in English and held by 1 WorldCat member library worldwide

The Role of Trust in Information Integrity Protocols( )

1 edition published in 1995 in English and held by 0 WorldCat member libraries worldwide

Paradoxically, one of the most important - and at the same time, probably one of the least understood - functions performed by information integrity protocols is to transfer trust from where it exists to where it is needed. Initially in any protocol, there are at least two types of trust: trust that designated participants, or groups of participants, will faithfully execute their assigned function in the protocol and trust in the integrity of the transfer mechanism(s) integral to the protocol. Consequently, almost all protocols enforce a set of restrictions as to who may exercise them - either spelled out explicitly or left implicit in the protocol specification. In addition there may be unanticipated or even unacceptable groupings of participants who can also exercise the protocol as a result of actions taken by some of the participants reflecting trusts that exist among them. Formal methods are developed to analyze trust as a fundamental dimension in protocol analysis and proof
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.65 (from 0.55 for Forward se ... to 1.00 for The Role o ...)

Contemporary cryptology : the science of information integrity
Alternative Names
Gustavus Simmons Amerikaans wiskundige

Gustavus Simmons mathématicien américain

Gustavus Simmons US-amerikanischer Mathematiker

Simmons, G.J.

Simmons, G. J. 1930-

Simmons, G. J. (Gustavus James)

Simmons, Gustavus 1930-

Simmons, Gustavus J.

Simmons, Gustavus James 1930-

Симмонс, Густавус Джеймс

Languages
Covers
Contemporary cryptology : the science of information integrity