John B. Kam

According to our database1, John B. Kam
  • authored at least 8 papers between 1975 and 1983.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

1983
An Approximation Algorithm to the File Allocation Problem in Computer Networks.
Proceedings of the Second ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1983

1981
A Database Encryption System with Subkeys.
ACM Trans. Database Syst., 1981

1979
Structured Design of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers, 1979

1978
Security and Privacy.
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

1977
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst., 1977

Monotone Data Flow Analysis Frameworks.
Acta Inf., 1977

1976
Global Data Flow Analysis and Iterative Algorithms.
J. ACM, 1976

1975
Application of Lattice Algebra to Loop Optimization.
Proceedings of the Conference Record of the Second ACM Symposium on Principles of Programming Languages, 1975


  Loading...