Author of the publication

Analysis of genetic diversity through population history

, and . Proceedings of the Genetic and Evolutionary Computation Conference, 2, page 1112--1120. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Key Steganography., and . IACR Cryptology ePrint Archive, (2003)CAPTCHA: Using Hard AI Problems for Security., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 294-311. Springer, (2003)Public-Key Steganography., and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 323-341. Springer, (2004)Provably Secure Steganography., , and . IEEE Trans. Computers, 58 (5): 662-676 (2009)Analysis of genetic diversity through population history, and . Proceedings of the Genetic and Evolutionary Computation Conference, 2, page 1112--1120. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)Covert two-party computation., , and . STOC, page 513-522. ACM, (2005)k-anonymous message transmission., , and . ACM Conference on Computer and Communications Security, page 122-130. ACM, (2003)AppGP: an alternative structural representation for GP., and . CEC, page 1377-1383. IEEE, (1999)Sutherland: An extensible object-oriented software framework for evolutionary computation, , and . Genetic Programming 1998: Proceedings of the Third Annual Conference, page 241. University of Wisconsin, Madison, Wisconsin, USA, Morgan Kaufmann, (22-25 July 1998)Provably Secure Steganography., , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 77-92. Springer, (2002)