You are here


Export 1153 results:
Author Title Type [ Year(Desc)]
von Neumann J, Morgenstern O. The Theory of Games and Economic Behavior. 60thth ed. Princeton, New Jersey, USA: Princeton University Press; 1944 p. 776. Available from:
Nash Jr. JF. Equilibrium points in n-person games. PNAS. Proceedings of the National Academy of Sciences of the USA. 1950 ;36(1):48-49.
Erdős P, Rényi A. On Random Graphs I. Publicationes Mathematicae (Debrecen). 1959 ;6:290-297.
Reed I, Solomon G. Polynomial codes over certain finite fields. Journal of the Society of Industrial and Applied Mathematics [Internet]. 1960 ;8(2):300–304. Available from:
Gallager RG. Low-density parity-check codes. Information Theory, IRE Transactions on [Internet]. 1962 ;8(1):21 - 28 . Available from:
Trivers RL. The Evolution of Reciprocal Altruism. The Quarterly Review of Biology [Internet]. 1971 ;46(1):35-57. Available from:
Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory. 1976 ;22(6):644-654.
Karger PA. Non-Discretionary Access Control for Decentralized Computing Systems. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. 1977 .
Dalenius T. Towards a methodology for statistical disclosure control. Statistik Tidskrift. 1977 ;15:2–1.
Lamport L, Shostak R, Pease M. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. [Internet]. 1982 ;4:382–401. Available from:
Yao AC. Protocols for Secure Computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Washington, DC, USA: IEEE Computer Society; 1982. Available from:
Fischer MJ, Lynch NA, Paterson MS. Impossibility of distributed consensus with one faulty process. J. ACM [Internet]. 1985 ;32:374–382. Available from:
Pfitzmann A, Waidner M. Networks Without User Observability – Design Options. In: Proceedings of EUROCRYPT 1985. Proceedings of EUROCRYPT 1985. Linz, Austria: Springer-Verlag New York, Inc.; 1985. Available from:
El Gamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Proceedings of CRYPTO 84 on Advances in cryptology. Proceedings of CRYPTO 84 on Advances in cryptology. Santa Barbara, California: Springer-Verlag New York, Inc.; 1985. pp. 10–18. Available from:
Tichy WF. RCS–-a system for version control. Softw. Pract. Exper. [Internet]. 1985 ;15:637–654. Available from: