关注
Neal Wagner
Neal Wagner
Retired Associate Professor of Computer Science
没有经过验证的电子邮件地址 - 首页
标题
引用次数
引用次数
年份
Fingerprinting
NR Wagner
1983 IEEE Symposium on Security and Privacy, 18-18, 1983
3331983
A public-key cryptosystem based on the word problem
NR Wagner, MR Magyarik
Workshop on the Theory and Application of Cryptographic Techniques, 19-36, 1984
2231984
The laws of cryptography with java code
NR Wagner
Available online at Neal Wagner’s home page, 2003
612003
Plagiarism by student programmers
NR Wagner
The University of Texas at San Antonio Division Computer Science San Antonio …, 2000
342000
Error detecting decimal digits
P Putter, NR Wagner
Communications of the ACM 32 (1), 106-110, 1989
341989
The sofa problem
NR Wagner
The American Mathematical Monthly 83 (3), 188-189, 1976
241976
The implementation of a cryptography-based secure office system
C Mueller-Schloer, NR Wagner
Proceedings of the June 7-10, 1982, national computer conference, 487-492, 1982
221982
The logistic lattice in random number generation
NR Wagner
PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 1992
211992
Searching for public-key cryptosystems
NR Wagner
1984 IEEE Symposium on Security and Privacy, 91-91, 1984
171984
Encrypted database design: Specialized approaches
NR Wagner, PS Putter, MR Cain
1986 IEEE Symposium on Security and Privacy, 148-148, 1986
161986
The space of retractions of the 2-sphere and the annulus
NR Wagner
Transactions of the American Mathematical Society 158 (2), 319-329, 1971
151971
A continuity property with applications to the topology of 2-manifolds
NR Wagner
Transactions of the American Mathematical Society 200, 369-393, 1974
91974
Large-scale randomization techniques
NR Wagner, PS Putter, MR Cain
Conference on the Theory and Application of Cryptographic Techniques, 393-404, 1986
61986
The Laws of Cryptography
RN Wagner
52002
The laws of cryptography: perfect cryptography: The one-time pad
NR Wagner
Available at:< cs. utsa. edu/~ wagner/laws/pad. html, 2002
52002
The space of retractions of a 2-manifold
NR Wagner
Proceedings of the American Mathematical Society 34 (2), 609-614, 1972
51972
Virtual rings: an introduction to concurrency
KA Robbins, NR Wagner, DJ Wenzel
ACM SIGCSE Bulletin 21 (2), 23-28, 1989
41989
Getting tenure at a university
NR Wagner
The University of Texas at San Antonio Computer Science Department …, 2006
32006
CAPTCHAs and information hiding
NR Wagner
32003
Using algorithms as keys in stream ciphers
NR Wagner, PS Putter, MR Cain
Advances in Cryptology—EUROCRYPT’85: Proceedings of a Workshop on the …, 1986
31986
系统目前无法执行此操作,请稍后再试。
文章 1–20