Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of Checksums and CRCs over Real Data., , and . SIGCOMM, page 68-76. ACM, (1995)HYPERchannel Network Computing: Network Elements and Performance Monitoring., and . INDC, page 177-188. North-Holland, (1988)A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem.. ACISP, volume 2384 of Lecture Notes in Computer Science, page 176-189. Springer, (2002)Handheld computers for self-administered sensitive data collection: A comparative study in Peru., , , , , , , , , and . BMC Medical Informatics Decis. Mak., (2008)The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems., and . ACM Queue, 20 (3): 18-40 (2022)HIPPI high performance parallel interface.. LCN, page 346-354. IEEE Computer Society, (1992)Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System., , and . IEEE Security in Storage Workshop, page 53-64. IEEE Computer Society, (2002)Factoring Estimates for a 1024-Bit RSA Modulus., , , , , , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 55-74. Springer, (2003)Computing the observed information in the hidden Markov model using the EM algorithm. Statistics & Probability Letters, 32 (1): 107--114 (Feb 14, 1997)Public Keys., , , , , and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 626-642. Springer, (2012)