|
Search the dblp DataBase
Neal R. Wagner:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christian Müller-Schloer, Neal R. Wagner
Cryptographic Protection of Personal Data Cards. [Citation Graph (0, 0)][DBLP] CRYPTO, 1982, pp:219-229 [Conf]
- Neal R. Wagner, Marianne R. Magyarik
A Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP] CRYPTO, 1984, pp:19-36 [Conf]
- Neal R. Wagner, Paul Putter, Marianne R. Cain
Large-Scale Randomization Techniques. [Citation Graph (0, 0)][DBLP] CRYPTO, 1986, pp:393-404 [Conf]
- Neal R. Wagner, Paul Putter, Marianne R. Cain
Using Algorithms as Keys in Stream Ciphers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1985, pp:149-155 [Conf]
- Neal R. Wagner, Robert L. Fountain, Robert J. Hazy
The Fingerprinted Database. [Citation Graph (0, 0)][DBLP] ICDE, 1990, pp:330-336 [Conf]
- Neal R. Wagner
Fingerprinting. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:18-22 [Conf]
- Neal R. Wagner
Searching for Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:91-98 [Conf]
- Neal R. Wagner, Paul Putter, Marianne R. Cain
Encrypted Database Design: Specialized Approaches. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:148-155 [Conf]
- Neal R. Wagner, Paul Putter
Error Detecting Decimal Digits. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1989, v:32, n:1, pp:106-110 [Journal]
The implementation of a cryptography-based secure office system. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|