Author of the publication

Finite-memory hypothesis testing-Comments on a critique (Corresp.).

, and . IEEE Trans. Inf. Theory, 16 (4): 496-497 (1970)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in communication networks.. AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 1131-1136. AFIPS Press, (1978)New directions in cryptography., and . IEEE Trans. Inf. Theory, 22 (6): 644-654 (1976)The Nearest Neighbor Classification Rule with a Reject Option.. IEEE Trans. Syst. Sci. Cybern., 6 (3): 179-185 (1970)Multiuser cryptographic techniques., and . AFIPS National Computer Conference, volume 45 of AFIPS Conference Proceedings, page 109-112. AFIPS Press, (1976)Probability of error, equivocation, and the Chernoff bound., and . IEEE Trans. Inf. Theory, 16 (4): 368-372 (1970)Hiding information and signatures in trapdoor knapsacks., and . IEEE Trans. Inf. Theory, 24 (5): 525-530 (1978)The two-armed-bandit problem with time-invariant finite memory., and . IEEE Trans. Inf. Theory, 16 (2): 185-195 (1970)On secret sharing systems., , and . IEEE Trans. Inf. Theory, 29 (1): 35-41 (1983)Concerning a bound on undetected error probability (Corresp.)., and . IEEE Trans. Inf. Theory, 22 (2): 235-237 (1976)On the necessity of cryptanalytic exhaustive search., , and . SIGACT News, 15 (1): 40-44 (1983)