The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Allen Roginsky: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen M. Matyas, Allen Roginsky
    An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:155-160 [Conf]
  2. Kenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky
    Design of a High-Speed Overlapped Round Robin (ORR) Arbiter. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:638-639 [Conf]
  3. Allen Roginsky, Kenneth J. Christensen, Steven Polge
    Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:7, pp:654-661 [Journal]
  4. Allen Roginsky, Kenneth J. Christensen, V. Srinivasan
    New methods for shortest path selection for multimedia traffic with two delay constraints. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:17, pp:1531-1539 [Journal]
  5. Kenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky
    Performance evaluation of new scheduling methods for the RR/RR CICQ switch. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:4, pp:417-428 [Journal]
  6. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  7. Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal]
  8. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
  9. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
  10. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
  11. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
  12. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
  13. Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani
    On probabilities of hash value matches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:171-176 [Journal]
  14. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Methods for preventing unauthorized software distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:316-321 [Journal]
  15. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
  16. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Hash-based encryption system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal]
  17. Kenneth J. Christensen, Kenji Yoshigoe, Allen Roginsky, Neil J. Gunther
    Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  18. G. Perera, K. Christensen, A. Roginsky
    Targeted search: reducing the time and cost for searching for objects in multiple-server networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:143-149 [Conf]

  19. A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. [Citation Graph (, )][DBLP]


Search in 0.079secs, Finished in 0.080secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002