![]() |
| 1991 | ||
|---|---|---|
| 5 | Paul Putter, J. D. Roos: From Policy to Specification. Open Distributed Processing 1991: 441-448 | |
| 1989 | ||
| 4 | Neal R. Wagner, Paul Putter: Error Detecting Decimal Digits. Commun. ACM 32(1): 106-110 (1989) | |
| 1986 | ||
| 3 | EE | Neal R. Wagner, Paul Putter, Marianne R. Cain: Large-Scale Randomization Techniques. CRYPTO 1986: 393-404 |
| 2 | Neal R. Wagner, Paul Putter, Marianne R. Cain: Encrypted Database Design: Specialized Approaches. IEEE Symposium on Security and Privacy 1986: 148-155 | |
| 1985 | ||
| 1 | EE | Neal R. Wagner, Paul Putter, Marianne R. Cain: Using Algorithms as Keys in Stream Ciphers. EUROCRYPT 1985: 149-155 |
| 1 | Marianne R. Cain | [1] [2] [3] |
| 2 | J. D. Roos | [5] |
| 3 | Neal R. Wagner | [1] [2] [3] [4] |