2008 |
9 | EE | Michael Purser,
David Chadwick:
Does an awareness of differing types of spreadsheet errors aid end-users in identifying spreadsheets errors?
CoRR abs/0803.0167: (2008) |
2005 |
8 | | Eabhnat Ní Fhloinn,
Michael Purser:
Applications of Hiding in RSA.
WEWoRC 2005: 86-97 |
1993 |
7 | | Susan Barry,
Patricia McQuillan,
Michael Purser,
Jonathan D. Moffett:
Implementing and Proving Security Services for the RARE/COSINE Community.
Computer Networks and ISDN Systems 26(3): 263-267 (1993) |
1992 |
6 | | Michael Purser:
COSINE Sub-Project P8: Security Services.
Computer Networks and ISDN Systems 25(4-5): 476-482 (1992) |
1988 |
5 | EE | Michael Purser:
X.25 - the fulcrum for network standardization.
Computer Communications 11(5): 234-238 (1988) |
1986 |
4 | EE | Michael Purser:
Multitasking across a LAN for communications switching.
Computer Communications 9(3): 135-142 (1986) |
3 | | Ahmed Patel,
Michael Purser:
The Design of a Small Packet-Switching Node.
Computer Networks 11: 287-295 (1986) |
1984 |
2 | | Michael Purser,
Chris Horn,
John Sheehan:
The PHS Protocol.
Softw., Pract. Exper. 14(4): 299-310 (1984) |
1980 |
1 | | Ahmed Patel,
Michael Purser:
Systems Programming for Data Communications on Minicomputers.
Softw., Pract. Exper. 10(4): 283-305 (1980) |