Fingerprinting NR Wagner 1983 IEEE Symposium on Security and Privacy, 18-18, 1983 | 333 | 1983 |
A public-key cryptosystem based on the word problem NR Wagner, MR Magyarik Workshop on the Theory and Application of Cryptographic Techniques, 19-36, 1984 | 223 | 1984 |
The laws of cryptography with java code NR Wagner Available online at Neal Wagner’s home page, 2003 | 61 | 2003 |
Plagiarism by student programmers NR Wagner The University of Texas at San Antonio Division Computer Science San Antonio …, 2000 | 34 | 2000 |
Error detecting decimal digits P Putter, NR Wagner Communications of the ACM 32 (1), 106-110, 1989 | 34 | 1989 |
The sofa problem NR Wagner The American Mathematical Monthly 83 (3), 188-189, 1976 | 24 | 1976 |
The implementation of a cryptography-based secure office system C Mueller-Schloer, NR Wagner Proceedings of the June 7-10, 1982, national computer conference, 487-492, 1982 | 22 | 1982 |
The logistic lattice in random number generation NR Wagner PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 1992 | 21 | 1992 |
Searching for public-key cryptosystems NR Wagner 1984 IEEE Symposium on Security and Privacy, 91-91, 1984 | 17 | 1984 |
Encrypted database design: Specialized approaches NR Wagner, PS Putter, MR Cain 1986 IEEE Symposium on Security and Privacy, 148-148, 1986 | 16 | 1986 |
The space of retractions of the 2-sphere and the annulus NR Wagner Transactions of the American Mathematical Society 158 (2), 319-329, 1971 | 15 | 1971 |
A continuity property with applications to the topology of 2-manifolds NR Wagner Transactions of the American Mathematical Society 200, 369-393, 1974 | 9 | 1974 |
Large-scale randomization techniques NR Wagner, PS Putter, MR Cain Conference on the Theory and Application of Cryptographic Techniques, 393-404, 1986 | 6 | 1986 |
The Laws of Cryptography RN Wagner | 5 | 2002 |
The laws of cryptography: perfect cryptography: The one-time pad NR Wagner Available at:< cs. utsa. edu/~ wagner/laws/pad. html, 2002 | 5 | 2002 |
The space of retractions of a 2-manifold NR Wagner Proceedings of the American Mathematical Society 34 (2), 609-614, 1972 | 5 | 1972 |
Virtual rings: an introduction to concurrency KA Robbins, NR Wagner, DJ Wenzel ACM SIGCSE Bulletin 21 (2), 23-28, 1989 | 4 | 1989 |
Getting tenure at a university NR Wagner The University of Texas at San Antonio Computer Science Department …, 2006 | 3 | 2006 |
CAPTCHAs and information hiding NR Wagner | 3 | 2003 |
Using algorithms as keys in stream ciphers NR Wagner, PS Putter, MR Cain Advances in Cryptology—EUROCRYPT’85: Proceedings of a Workshop on the …, 1986 | 3 | 1986 |