Author of the publication

The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols.

, , , and . Data Compression Conference, page 494. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Digital Signature Scheme Based on Random Error-Correcting Codes., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 161-167. Springer, (1997)Keyed logic BIST for Trojan detection in SoC., , , and . ISSoC, page 1-4. IEEE, (2014)On A²-Codes Including Arbiter's Attacks., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 456-460. Springer, (1994)Unconditionally Secure Group Authentication., , and . Des. Codes Cryptogr., 14 (3): 281-296 (1998)Multialphabet coding with separate alphabet description., , and . SEQUENCES, page 56-65. IEEE, (1997)On the Use of the Binary Multiplying Channel in a Private Communication System.. EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 339-348. Springer, (1984)A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 181-195. Springer, (2000)Weighting of Double Exponential Distributed Data in Lossless Image Compression., and . Data Compression Conference, page 543. IEEE Computer Society, (1998)On the Relation between A-Codes and Codes Correcting Independent Errors., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 1-11. Springer, (1993)Windmill Generators: A Generalization and an Observation of How Many There Are., and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 325-330. Springer, (1988)