Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer-related risks.. Addison-Wesley, (1995)Security and Privacy Issues in Computer and Communication Systems.. The Computer Science and Engineering Handbook, CRC Press, (1997)Error-Correcting Codes for Byte-Organized Arithmetic Processors., and . IEEE Trans. Computers, 24 (3): 226-232 (1975)Computer-Related Risk Futures.. ACSAC, page 35-40. IEEE Computer Society, (2009)Effects of multilevel security on real-time applications., , , , , , and . ACSAC, page 120-129. IEEE, (1993)The IEEE Symposium on Security and Privacy Is Moving to San Francisco., and . IEEE Security & Privacy, 10 (2): 65-66 (2012)On a class of efficient error-limiting variable-length codes.. IRE Trans. Information Theory, 8 (5): 260-266 (1962)CHERI Concentrate: Practical Compressed Capabilities., , , , , , , , , and 4 other author(s). IEEE Trans. Computers, 68 (10): 1455-1469 (2019)Risks to the public in computers and related systems.. ACM SIGSOFT Software Engineering Notes, 24 (4): 26-29 (1999)Risks to the Public.. ACM SIGSOFT Software Engineering Notes, 40 (4): 15-20 (2015)