Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English., and . Cryptologia, 18 (4): 289-331 (1994)How we Solved the $100, 000 Decipher Puzzle (16 Hours too late)., and . Cryptologia, 14 (3): 258-284 (1990)BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer., and . IACR Cryptol. ePrint Arch., (2020)How to Break Gifford's Cipher., and . Cryptologia, 21 (3): 237-286 (1997)UDM: Private user discovery with minimal information disclosure., , , and . Cryptologia, 46 (4): 347-379 (2022)Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes., , , , , , and . IEEE Trans. Educ., 61 (1): 11-20 (2018)Psychometric Evaluation of the Cybersecurity Concept Inventory., , , , , , , and . ACM Trans. Comput. Educ., 22 (1): 6:1-6:18 (2022)Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting., , , , , , and . IEEE Secur. Priv., 6 (3): 40-46 (2008)*Socrates 2.0 Beats Grandmaster Sagalchik., and . J. Int. Comput. Games Assoc., 18 (2): 124 (1995)Cybersecurity: Exploring core concepts through six scenarios., , , , , , , and . Cryptologia, 42 (4): 337-377 (2018)