dblp.uni-trier.dewww.uni-trier.de

Allen Roginsky

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
19EEMiguel Jimeno, Kenneth J. Christensen, Allen Roginsky: A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. IPCCC 2007: 125-133
2005
18EEG. Perera, Kenneth J. Christensen, Allen Roginsky: Targeted search: reducing the time and cost for searching for objects in multiple-server networks. IPCCC 2005: 143-149
17EEKenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky: Performance evaluation of new scheduling methods for the RR/RR CICQ switch. Computer Communications 28(4): 417-428 (2005)
2004
16EEKenneth J. Christensen, Kenji Yoshigoe, Allen Roginsky, Neil J. Gunther: Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches CoRR cs.NI/0403030: (2004)
15EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Non-PKI methods for public key distribution. Computers & Security 23(2): 97-103 (2004)
2003
14EEKenji Yoshigoe, Kenneth J. Christensen, Allen Roginsky: Design of a High-Speed Overlapped Round Robin (ORR) Arbiter. LCN 2003: 638-639
13EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Methods for preventing unauthorized software distribution. Computers & Security 22(4): 316-321 (2003)
2001
12 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Alternative Method for Unique RSA Primes Generation. Computers & Security 20(2): 173-179 (2001)
2000
11 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computers & Security 19(3): 282-288 (2000)
10 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Multiparty Biometric-Based Authentication. Computers & Security 19(4): 369-374 (2000)
9 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Ticket and Challenge-Based Protocols for Timestamping. Computers & Security 19(6): 551-558 (2000)
1999
8EEStephen M. Matyas, Allen Roginsky: An Effective Defense Against First Party Attacks in Public-Key Algorithms. ACSAC 1999: 155-160
7EEAllen Roginsky, Kenneth J. Christensen, V. Srinivasan: New methods for shortest path selection for multimedia traffic with two delay constraints. Computer Communications 22(17): 1531-1539 (1999)
6EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Hash-based encryption system. Computers & Security 18(4): 345-350 (1999)
5EEMohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7): 619-626 (1999)
1998
4EEAllen Roginsky, Kenneth J. Christensen, Steven Polge: Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol. Computer Communications 21(7): 654-661 (1998)
3EEMohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani: On probabilities of hash value matches. Computers & Security 17(2): 171-176 (1998)
2EEMike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic: Reversible data mixing procedure for efficient public-key encryption. Computers & Security 17(3): 265-272 (1998)
1997
1EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)

Coauthor Index

1Kenneth J. Christensen [4] [7] [14] [16] [17] [18] [19]
2Rosario Gennaro [1]
3Neil J. Gunther [16]
4Miguel Jimeno [19]
5Paul A. Karger [1]
6Ajay D. Kshemkalyani [3]
7Mike Matyas [2]
8Stephen M. Matyas [1] [5] [8] [9] [10] [11] [12]
9G. Perera [18]
10Mohammad Peyravian [1] [2] [3] [5] [6] [9] [10] [11] [12] [13] [15]
11Steven Polge [4]
12David Safford [1]
13V. Srinivasan [7]
14Michael Willett [1]
15Kenji Yoshigoe [14] [16] [17]
16Nevenko Zunic [1] [2] [5] [6] [9] [10] [11] [12] [13] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)