Paper Recommendation
1978 A Method For Obtaining Digital Signatures and Public-key Cryptosystems

1994 A Digital Watermark

1979 Suppression of Acoustic Noise in Speech Using Spectral Subtraction

1979 Privacy and Authentication: An introduction To Cryptography

1978 Using Encryption For Authentication in Large Networks of Computers

1983 Randomized Byzantine Generals

1990 A Fast Software one-way Hash Function

1994 Human-Computer interaction

2000 A New Remote User Authentication Scheme Using Smart Cards

1986 A Global Authentication Service Without Global Trust

2005 File System Forensic Analysis

2000 Efficient Authentication and Signing of Multicast Streams Over Lossy Channels

1996 Mixing E-mail With Babel

2002 WLAN-GPRS integration For Next-generation Mobile Data Networks

1988 A Digital Signature Scheme Secure Against Adaptive Chosen-message attacks

2004 A one Round Protocol For Tripartite Diffie–Hellman

1984 A "Paradoxical" Solution To The Signature Problem

1981 Password Authentication With insecure Communication

2000 Automated Trust Negotiation

1988 Protocol Failures in Cryptosystems