Publication Okapi Chinese text retrieval experiments at TREC-6 Stephen Robertson, Xuedong Huang The Sixth Text REtrieval Conference (TREC-6) | January 1998
Publication Spam! Lorrie Faith Cranor, Brian LaMacchia Commununications of the ACM | January 1998, Vol 41(8): pp. 74-83
Publication Certificate Revocation: Mechanics and Meaning Barbara Fox, Brian LaMacchia FC ’98: Proceedings of the Second International Conference on Financial Cryptography | January 1998 ISBN: 3-540-64951-4
Publication High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems Tolga Acar December 1997
Publication Highly Parallel Cryptographic Attacks Marcus Peinado, Ramarathnam Venkatesan Lecture Notes in Computer Science 1332 | November 1997
Publication Smokey: Automatic Recognition of Hostile Messages Ellen Spertus Proceedings of IAAI-97, the 9th Conference on Innovative Application of Artificial Intelligence | July 1997
Publication Reasoning about Cryptographic Protocols in the Spi Calculus Martin Abadi, Andy Gordon CONCUR ’97: Concurrency Theory: Lecture Notes in Computer Science | July 1997 ISBN: 978-3-540-63141-5 (Print) 978-3-540-69188-4 (Online)
Publication A Calculus for Cryptographic Protocols: The Spi Calculus Martı́n Abadi, Andy Gordon Proceedings of the 4th ACM Conference on Computer and Communications Security | April 1997 ISBN: 0-89791-912-2
Publication Fast software exponentiation in GF(2k) C.K. Koc, Tolga Acar 1997 Symposium on Computer Arithmetic | March 1997
Publication SDSI – A Simple Distributed Security Infrastructure Butler Lampson, Ronald L. Rivest October 1996