2007 |
19 | EE | Miguel Jimeno,
Kenneth J. Christensen,
Allen Roginsky:
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives.
IPCCC 2007: 125-133 |
2005 |
18 | EE | G. Perera,
Kenneth J. Christensen,
Allen Roginsky:
Targeted search: reducing the time and cost for searching for objects in multiple-server networks.
IPCCC 2005: 143-149 |
17 | EE | Kenji Yoshigoe,
Kenneth J. Christensen,
Allen Roginsky:
Performance evaluation of new scheduling methods for the RR/RR CICQ switch.
Computer Communications 28(4): 417-428 (2005) |
2004 |
16 | EE | Kenneth J. Christensen,
Kenji Yoshigoe,
Allen Roginsky,
Neil J. Gunther:
Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches
CoRR cs.NI/0403030: (2004) |
15 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Non-PKI methods for public key distribution.
Computers & Security 23(2): 97-103 (2004) |
2003 |
14 | EE | Kenji Yoshigoe,
Kenneth J. Christensen,
Allen Roginsky:
Design of a High-Speed Overlapped Round Robin (ORR) Arbiter.
LCN 2003: 638-639 |
13 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Methods for preventing unauthorized software distribution.
Computers & Security 22(4): 316-321 (2003) |
2001 |
12 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation.
Computers & Security 20(2): 173-179 (2001) |
2000 |
11 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Computers & Security 19(3): 282-288 (2000) |
10 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Multiparty Biometric-Based Authentication.
Computers & Security 19(4): 369-374 (2000) |
9 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
Computers & Security 19(6): 551-558 (2000) |
1999 |
8 | EE | Stephen M. Matyas,
Allen Roginsky:
An Effective Defense Against First Party Attacks in Public-Key Algorithms.
ACSAC 1999: 155-160 |
7 | EE | Allen Roginsky,
Kenneth J. Christensen,
V. Srinivasan:
New methods for shortest path selection for multimedia traffic with two delay constraints.
Computer Communications 22(17): 1531-1539 (1999) |
6 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Hash-based encryption system.
Computers & Security 18(4): 345-350 (1999) |
5 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generating user-based cryptographic keys and random numbers.
Computers & Security 18(7): 619-626 (1999) |
1998 |
4 | EE | Allen Roginsky,
Kenneth J. Christensen,
Steven Polge:
Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol.
Computer Communications 21(7): 654-661 (1998) |
3 | EE | Mohammad Peyravian,
Allen Roginsky,
Ajay D. Kshemkalyani:
On probabilities of hash value matches.
Computers & Security 17(2): 171-176 (1998) |
2 | EE | Mike Matyas,
Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption.
Computers & Security 17(3): 265-272 (1998) |
1997 |
1 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |