Author of the publication

A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.).

, and . IEEE Trans. Inf. Theory, 13 (2): 335-336 (1967)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion detection inter-component adaptive negotiation., , , , , , , , and . Comput. Networks, 34 (4): 605-621 (2000)A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.)., and . IEEE Trans. Inf. Theory, 13 (2): 335-336 (1967)The Design and Implementation of a Data Level Database Inference Detection System., and . DBSec, volume 142 of IFIP Conference Proceedings, page 253-266. Kluwer, (1998)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , and . HUG, volume 780 of Lecture Notes in Computer Science, page 29-42. Springer, (1993)DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET., , and . AsiaCCS, page 395-397. ACM, (2007)Discovery of Multi-Level Security Policies., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 173-184. Kluwer, (2000)SELECT - a formal system for testing and debugging programs by symbolic execution., , and . Reliable Software, page 234-245. ACM, (1975)Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components., and . S&P, page 122-135. IEEE Computer Society, (1991)DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET., , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 249-271. Springer, (2006)Towards Applying the Composition Principle to Verify a Microkernel Operating System., , , , , and . TPHOLs, volume 1125 of Lecture Notes in Computer Science, page 235-250. Springer, (1996)