Stephen T. Walker

According to our database1, Stephen T. Walker authored at least 7 papers between 1980 and 1999.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1999
Cryptography Policy Update.
Cryptologia, 1999

1998
The Evolution of Recent Cryptographic Policy in the United States.
Cryptologia, 1998

1996
Commercial Key Recovery.
Commun. ACM, 1996

1995
Keynote Address: Why are our Systems Insecure? Must they always be?
Proceedings of the 5th USENIX Security Symposium, 1995

1986
Design and Implementation of a Trusted Mail Agent.
Proceedings of the New Communication Services: A Challenge to Computer Technology, 1986

1985
Network Security Overview.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1980
The advent of trusted computer operating systems.
Proceedings of the American Federation of Information Processing Societies: 1980 National Computer Conference, 1980


  Loading...