Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jumble Java Byte Code to Measure the Effectiveness of Unit Tests, , , , , and . Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION’07), page 169–175. Windsor and UK, (2007)An automatic cryptanalysis of simple substitution ciphers using compression., , and . Inf. Secur. J. A Glob. Perspect., 27 (1): 57-75 (2018)An Automatic Cryptanalysis of Transposition Ciphers Using Compression., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 36-52. (2016)An Automatic Cryptanalysis of Playfair Ciphers Using Compression., , and . HistoCrypt, volume 149 of Linköping Electronic Conference Proceedings, page 149:021. Linköping University Electronic Press, (2018)SureChEMBL: a large-scale, chemically annotated patent document database., , , , , , , , , and 2 other author(s). Nucleic Acids Res., 44 (Database-Issue): 1220-1228 (2016)On the insecurity of arithmetic coding., , and . Comput. Secur., 14 (2): 167-180 (1995)Integrating error detection into arithmetic coding., , , , and . IEEE Trans. Commun., 45 (1): 1-3 (1997)