Yeheskel Lapid

According to our database1, Yeheskel Lapid authored at least 4 papers between 1986 and 1988.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1988
Protecting statistical databases against retrieval of private information.
Comput. Secur., 1988

1987
Verifying the authentication of an information system user.
Comput. Secur., 1987

Processing Encrypted Data.
Commun. ACM, 1987

1986
Approaches to handling "Trojan Horse" threats.
Comput. Secur., 1986


  Loading...