Rivest, R
7  Ergebnisse:
Personensuche X
?
1

Proxy-based security protocols in networked mobile devices:

, In: Proceedings of the 2002 ACM symposium on Applied computing,
Burnside, M. ; Clarke, D. ; Mills, T.... - p. 265-272 , 2002
 
?
2

Inference of finite automata using homing sequences:

, In: Proceedings of the twenty-first annual ACM symposium on Theory of computing,
Rivest, R. L. ; Schapire, R. E. - p. 411-420 , 1989
 
?
3

A "GGreedy" channel router:

, In: Papers on Twenty-five years of electronic design automation,
Rivest, R. L. ; Fiduccia, C. M. - p. 256-262 , 1988
 
?
4

A "Paradoxical" Solution To The Signature Problem:

, In: 25th Annual Symposium onFoundations of Computer Science, 1984.,
Goldwasser, S. ; Micali, S. ; Rivest, R.L. - p. 441,442,443,444,445,446,447,448 , 1984
 
?
5

Coping with errors in binary search procedures (Preliminary..:

, In: Proceedings of the tenth annual ACM symposium on Theory of computing,
Rivest, R. L. ; Meyer, A. R. ; Kleitman, D. J. - p. 227-232 , 1978
 
?
6

Contributors:

, In: Neural Surface Antigens,
 
1-7