Allen Roginsky

According to our database1, Allen Roginsky authored at least 21 papers between 1997 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A new analysis of the false positive rate of a Bloom filter.
Inf. Process. Lett., 2010

2007
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

2005
Performance evaluation of new scheduling methods for the RR/RR CICQ switch.
Comput. Commun., 2005

Targeted search: reducing the time and cost for searching for objects in multiple-server networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
Performance Evaluation of Packet-to-Cell Segmentation Schemes in Input Buffered Packet Switches
CoRR, 2004

Non-PKI methods for public key distribution.
Comput. Secur., 2004

Performance of packet-to-cell segmentation schemes in input buffered packet switches.
Proceedings of IEEE International Conference on Communications, 2004

2003
Methods for preventing unauthorized software distribution.
Comput. Secur., 2003

Design of a High-Speed Overlapped Round Robin (ORR) Arbiter.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2001
Alternative Method for Unique RSA Primes Generation.
Comput. Secur., 2001

2000
Ticket and Challenge-Based Protocols for Timestamping.
Comput. Secur., 2000

Multiparty Biometric-Based Authentication.
Comput. Secur., 2000

Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Comput. Secur., 2000

1999
Hash-based encryption system.
Comput. Secur., 1999

Generating user-based cryptographic keys and random numbers.
Comput. Secur., 1999

New methods for shortest path selection for multimedia traffic with two delay constraints.
Comput. Commun., 1999

An Effective Defense Against First Party Attacks in Public-Key Algorithms.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
On probabilities of hash value matches.
Comput. Secur., 1998

Reversible data mixing procedure for efficient public-key encryption.
Comput. Secur., 1998

Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol.
Comput. Commun., 1998

1997
Two-phase cryptographic key recovery system.
Comput. Secur., 1997


  Loading...