Carl H. Meyer

According to our database1, Carl H. Meyer authored at least 10 papers between 1973 and 1985.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1985
Message authentication.
IEEE Commun. Mag., 1985

1983
Message Authentication with Manipulation Detection Code.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1981
Correction to the Special Section on Computer Network Security of the June 1981 Issue.
IEEE Trans. Commun., 1981

Cryptographic Authentication of Time-Invariant Quantities.
IEEE Trans. Commun., 1981

Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

Some cryptographic principles of authentication in electronic funds transfer systems.
Proceedings of the seventh symposium on Data communications, 1981

1978
Generation, Distribution, and Installation of Cryptographic Keys.
IBM Syst. J., 1978

A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard.
IBM Syst. J., 1978

Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978

1973
Design considerations for cryptography.
Proceedings of the American Federation of Information Processing Societies: 1973 National Computer Conference, 1973


  Loading...