Neal R. Wagner

According to our database1, Neal R. Wagner authored at least 13 papers between 1980 and 1990.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1990
The Fingerprinted Database.
Proceedings of the Sixth International Conference on Data Engineering, 1990

1989
Virtual rings: an introduction to concurrency.
ACM SIGCSE Bull., 1989

Error Detecting Decimal Digits.
Commun. ACM, 1989

1986
Encrypted Database Design: Specialized Approaches.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

Large-Scale Randomization Techniques.
Proceedings of the Advances in Cryptology, 1986

1985
Using Algorithms as Keys in Stream Ciphers.
Proceedings of the Advances in Cryptology, 1985

1984
Searching for Public-Key Cryptosystems.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

A Public Key Cryptosystem Based on the Word Problem.
Proceedings of the Advances in Cryptology, 1984

1983
Fingerprinting.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
Shared Database Access using Composed Encryption Functions.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

Cryptographic Protection of Personal Data Cards.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

The implementation of a cryptography-based secure office system.
Proceedings of the American Federation of Information Processing Societies: 1982 National Computer Conference, 1982

1980
A Fortran preprocessor for the large program environment.
ACM SIGPLAN Notices, 1980


  Loading...