Author of the publication

Finite-memory hypothesis testing-Comments on a critique (Corresp.).

, and . IEEE Trans. Inf. Theory, 16 (4): 496-497 (1970)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New directions in cryptography., and . IEEE Trans. Inf. Theory, 22 (6): 644-654 (1976)The Nearest Neighbor Classification Rule with a Reject Option.. IEEE Trans. Syst. Sci. Cybern., 6 (3): 179-185 (1970)Security in communication networks.. AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 1131-1136. AFIPS Press, (1978)Multiuser cryptographic techniques., and . AFIPS National Computer Conference, volume 45 of AFIPS Conference Proceedings, page 109-112. AFIPS Press, (1976)On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis., , and . CRYPTO, page 2-6. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)The two-armed-bandit problem with time-invariant finite memory., and . IEEE Trans. Inf. Theory, 16 (2): 185-195 (1970)On secret sharing systems., , and . IEEE Trans. Inf. Theory, 29 (1): 35-41 (1983)Probability of error, equivocation, and the Chernoff bound., and . IEEE Trans. Inf. Theory, 16 (4): 368-372 (1970)Hiding information and signatures in trapdoor knapsacks., and . IEEE Trans. Inf. Theory, 24 (5): 525-530 (1978)Concerning a bound on undetected error probability (Corresp.)., and . IEEE Trans. Inf. Theory, 22 (2): 235-237 (1976)