|
Search the dblp DataBase
Allen Roginsky:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stephen M. Matyas, Allen Roginsky
An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:155-160 [Conf]
- Kenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky
Design of a High-Speed Overlapped Round Robin (ORR) Arbiter. [Citation Graph (0, 0)][DBLP] LCN, 2003, pp:638-639 [Conf]
- Allen Roginsky, Kenneth J. Christensen, Steven Polge
Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:7, pp:654-661 [Journal]
- Allen Roginsky, Kenneth J. Christensen, V. Srinivasan
New methods for shortest path selection for multimedia traffic with two delay constraints. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:17, pp:1531-1539 [Journal]
- Kenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky
Performance evaluation of new scheduling methods for the RR/RR CICQ switch. [Citation Graph (0, 0)][DBLP] Computer Communications, 2005, v:28, n:4, pp:417-428 [Journal]
- Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
- Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
- Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani
On probabilities of hash value matches. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:2, pp:171-176 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Methods for preventing unauthorized software distribution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:4, pp:316-321 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Hash-based encryption system. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal]
- Kenneth J. Christensen, Kenji Yoshigoe, Allen Roginsky, Neil J. Gunther
Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- G. Perera, K. Christensen, A. Roginsky
Targeted search: reducing the time and cost for searching for objects in multiple-server networks. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:143-149 [Conf]
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. [Citation Graph (, )][DBLP]
Search in 0.079secs, Finished in 0.080secs
|