Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error-Correcting Codes for Byte-Organized Arithmetic Processors., and . IEEE Trans. Computers, 24 (3): 226-232 (1975)On a class of efficient error-limiting variable-length codes.. IRE Trans. Information Theory, 8 (5): 260-266 (1962)Computer-related risks.. Addison-Wesley, (1995)Security and Privacy Issues in Computer and Communication Systems.. The Computer Science and Engineering Handbook, CRC Press, (1997)Computer-Related Risk Futures.. ACSAC, page 35-40. IEEE Computer Society, (2009)Effects of multilevel security on real-time applications., , , , , , and . ACSAC, page 120-129. IEEE, (1993)Fast Protection-Domain Crossing in the CHERI Capability-System Architecture., , , , , , , , , and 9 other author(s). IEEE Micro, 36 (5): 38-49 (2016)The IEEE Symposium on Security and Privacy Is Moving to San Francisco., and . IEEE Security & Privacy, 10 (2): 65-66 (2012)Risks to the public in computers and related systems.. ACM SIGSOFT Software Engineering Notes, 27 (1): 7-17 (2002)Risks to the public.. ACM SIGSOFT Software Engineering Notes, 39 (5): 3:14-3:21 (2014)