You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
1985
Pfitzmann A, Waidner M. Networks Without User Observability – Design Options. In: Proceedings of EUROCRYPT 1985. Proceedings of EUROCRYPT 1985. Linz, Austria: Springer-Verlag New York, Inc.; 1985. Available from: http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html
El Gamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Proceedings of CRYPTO 84 on Advances in cryptology. Proceedings of CRYPTO 84 on Advances in cryptology. Santa Barbara, California: Springer-Verlag New York, Inc.; 1985. pp. 10–18. Available from: http://dl.acm.org/citation.cfm?id=19478.19480s
Tichy WF. RCS–-a system for version control. Softw. Pract. Exper. [Internet]. 1985 ;15:637–654. Available from: http://portal.acm.org/citation.cfm?id=4202#
Chaum D. Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM [Internet]. 1985 ;28(10):1030 - 1044 . Available from: http://portal.acm.org/citation.cfm?id=4373
1982
Lamport L, Shostak R, Pease M. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. [Internet]. 1982 ;4:382–401. Available from: http://portal.acm.org/citation.cfm?id=357176#
Yao AC. Protocols for Secure Computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Washington, DC, USA: IEEE Computer Society; 1982. Available from: http://dx.doi.org/10.1109/SFCS.1982.88
1977
Karger PA. Non-Discretionary Access Control for Decentralized Computing Systems. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. 1977 .
Dalenius T. Towards a methodology for statistical disclosure control. Statistik Tidskrift. 1977 ;15:2–1.
1976
Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory. 1976 ;22(6):644-654.
1971
Trivers RL. The Evolution of Reciprocal Altruism. The Quarterly Review of Biology [Internet]. 1971 ;46(1):35-57. Available from: http://www.jstor.org/pss/2822435
1962
Gallager RG. Low-density parity-check codes. Information Theory, IRE Transactions on [Internet]. 1962 ;8(1):21 - 28 . Available from: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1057683
1960
Reed I, Solomon G. Polynomial codes over certain finite fields. Journal of the Society of Industrial and Applied Mathematics [Internet]. 1960 ;8(2):300–304. Available from: http://www.jstor.org/pss/2098968
1959
Erdős P, Rényi A. On Random Graphs I. Publicationes Mathematicae (Debrecen). 1959 ;6:290-297.
1950
Nash Jr. JF. Equilibrium points in n-person games. PNAS. Proceedings of the National Academy of Sciences of the USA. 1950 ;36(1):48-49.
1944
von Neumann J, Morgenstern O. The Theory of Games and Economic Behavior. 60thth ed. Princeton, New Jersey, USA: Princeton University Press; 1944 p. 776. Available from: http://www.archive.org/details/theoryofgamesand030098mbp

Pages