Michael Willett

According to our database1, Michael Willett authored at least 16 papers between 1975 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Trusted Storage: Putting Security and Data Together.
Proceedings of the ISSE 2008, 2008

2006
Trusted Storage: Focus on Use Cases.
Proceedings of the 2006 International Conference on Security & Management, 2006

2000
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Comput. Secur., 2000

Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products.
Comput. Secur., 2000

Cryptographic Information Recovery Using Key Recover.
Comput. Secur., 2000

1997
Two-phase cryptographic key recovery system.
Comput. Secur., 1997

1988
LAN management in an IBM framework.
IEEE Netw., 1988

1987
Token-ring local area networks-an introduction.
IEEE Netw., 1987

1986
The IBM Token-Ring Network: A Functional Perspective.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986

1983
Trapdoor Knapsacks Without Superincreasing Structure.
Inf. Process. Lett., 1983

Cryptography and data security overview of panel discussion.
Proceedings of the 1983 Annual Conference on Computers: extending the human resource, 1983

1982
Guest editorial.
Comput. Secur., 1982

Cryptography old and new.
Comput. Secur., 1982

A tutorial on public key cryptography.
Comput. Secur., 1982

1980
Deliberate noise in a modern cryptographic system (Corresp.).
IEEE Trans. Inf. Theory, 1980

1975
Cycle representatives for minimal cyclic codes (Corresp.).
IEEE Trans. Inf. Theory, 1975


  Loading...