Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Immediate Data Authentication for Multicast in Resource Constrained Network., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 113-121. Springer, (2005)INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). IEEE Secur. Priv., 15 (4): 72-78 (2017)Broadcast Control Channel Jamming: Resilience and Identification of Traitors., , , and . ISIT, page 2496-2500. IEEE, (2007)Innovative numerical schemes for 3D supersonic aerodynamics on unstructured mesh. (Méthodes numériques innovantes pour l'aérodynamique supersonique 3D sur des maillages non-structurés).. University of Bordeaux, France, (2022)Entropy stable and positivity preserving Godunov-type schemes for multidimensional hyperbolic systems on unstructured grid., , , and . J. Comput. Phys., (2022)The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). CoRR, (2017)On the quadratic spans of DeBruijn sequences., and . IEEE Trans. Inf. Theory, 36 (4): 822-829 (1990)A fast algorithm for determining the complexity of a binary sequence with period 2n., and . IEEE Trans. Inf. Theory, 29 (1): 144-146 (1983)On the linear complexity of feedback registers., , and . IEEE Trans. Inf. Theory, 36 (3): 640-644 (1990)The Software-Oriented Stream Cipher SSC2., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 31-48. Springer, (2000)