1990 |
10 | EE | Neal R. Wagner,
Robert L. Fountain,
Robert J. Hazy:
The Fingerprinted Database.
ICDE 1990: 330-336 |
1989 |
9 | | Neal R. Wagner,
Paul Putter:
Error Detecting Decimal Digits.
Commun. ACM 32(1): 106-110 (1989) |
1986 |
8 | EE | Neal R. Wagner,
Paul Putter,
Marianne R. Cain:
Large-Scale Randomization Techniques.
CRYPTO 1986: 393-404 |
7 | | Neal R. Wagner,
Paul Putter,
Marianne R. Cain:
Encrypted Database Design: Specialized Approaches.
IEEE Symposium on Security and Privacy 1986: 148-155 |
1985 |
6 | EE | Neal R. Wagner,
Paul Putter,
Marianne R. Cain:
Using Algorithms as Keys in Stream Ciphers.
EUROCRYPT 1985: 149-155 |
1984 |
5 | EE | Neal R. Wagner,
Marianne R. Magyarik:
A Public Key Cryptosystem Based on the Word Problem.
CRYPTO 1984: 19-36 |
4 | | Neal R. Wagner:
Searching for Public-Key Cryptosystems.
IEEE Symposium on Security and Privacy 1984: 91-98 |
1983 |
3 | | Neal R. Wagner:
Fingerprinting.
IEEE Symposium on Security and Privacy 1983: 18-22 |
1982 |
2 | EE | Christian Müller-Schloer,
Neal R. Wagner:
The implementation of a cryptography-based secure office system.
AFIPS National Computer Conference 1982: 487-492 |
1 | | Christian Müller-Schloer,
Neal R. Wagner:
Cryptographic Protection of Personal Data Cards.
CRYPTO 1982: 219-229 |