2005 | ||
---|---|---|
8 | EE | David Wheeler: Countering Trusting Trust through Diverse Double-Compiling. ACSAC 2005: 33-48 |
7 | EE | David Wheeler, Michael Tiefelsdorf: Multicollinearity and correlation among local regression coefficients in geographically weighted regression. Journal of Geographical Systems 7(2): 161-187 (2005) |
2004 | ||
6 | EE | David Wheeler: Last Orders. Security Protocols Workshop 2004: 324 |
2003 | ||
5 | EE | Bruce Christianson, Michael Roe, David Wheeler: Secure Sessions from Weak Secrets. Security Protocols Workshop 2003: 190-205 |
2001 | ||
4 | EE | David Wheeler: Protocols Using Keys from Faulty Data. Security Protocols Workshop 2001: 170-179 |
3 | EE | David Wheeler: Protocols Using Keys from Faulty Data (Transcript of Discussion). Security Protocols Workshop 2001: 180-187 |
2 | EE | Bruce Christianson, David Wheeler: Merkle Puzzles Revisited - Finding Matching Elements Between Lists. Security Protocols Workshop 2001: 87-90 |
1996 | ||
1 | David Wheeler: Transactions Using Bets. Security Protocols Workshop 1996: 89-92 |
1 | Bruce Christianson | [2] [5] |
2 | Michael Roe | [5] |
3 | Michael Tiefelsdorf | [7] |