-
3
-
-
0018465825
-
IMPROVED ALGORITHM FOR DECENTRALIZED EXTREMA-FINDING IN CIRCULAR CONFIGURATIONS OF PROCESSES.
-
DOI 10.1145/359104.359108
-
E. Chang and R. Roberts. An improved algorithm for decentralized extrema-finding in circular configurations of processes. Communications of the ACM, 22(5):281-283, 1979. (Pubitemid 9461372)
-
(1979)
Commun ACM
, vol.22
, Issue.5
, pp. 281-283
-
-
Chang, E.1
Roberts, R.2
-
4
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
W. Diffie and M. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, 1979.
-
(1979)
Proceedings of the IEEE
, vol.67
, Issue.3
, pp. 397-427
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
0034842559
-
Instrumenting the world with wireless sensor networks
-
IEEE
-
D. Estrin, L. Girod, G. Pottie, and M. Srivastava. Instrumenting the world with wireless sensor networks. In Acoustics, Speech, and Signal Processing, 2001. Proceedings.(ICASSP'01). 2001 IEEE International Conference on, volume 4, pages 2033-2036. IEEE, 2001.
-
(2001)
Acoustics, Speech, and Signal Processing, 2001. Proceedings.(ICASSP'01). 2001 IEEE International Conference on
, vol.4
, pp. 2033-2036
-
-
Estrin, D.1
Girod, L.2
Pottie, G.3
Srivastava, M.4
-
7
-
-
85010036715
-
A TRNG exploiting multi-source physical data
-
ACM
-
V. Gaglio, A. De Paola, M. Ortolani, and G. Lo Re. A TRNG exploiting multi-source physical data. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks, pages 82-89. ACM, 2010.
-
(2010)
Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks
, pp. 82-89
-
-
Gaglio, V.1
De Paola, A.2
Ortolani, M.3
Lo Re, G.4
-
8
-
-
84976831429
-
A distributed algorithm for minimum-weight spanning trees
-
R. Gallager, P. Humblet, and P. Spira. A distributed algorithm for minimum-weight spanning trees. ACM Transactions on Programming Languages and systems (TOPLAS), 5(1):66-77, 1983.
-
(1983)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.5
, Issue.1
, pp. 66-77
-
-
Gallager, R.1
Humblet, P.2
Spira, P.3
-
9
-
-
84976712802
-
Decentralized extrema-finding in circular configurations of processors
-
D. Hirschberg and J. Sinclair. Decentralized extrema-finding in circular configurations of processors. Communications of the ACM, 23(11):627-628, 1980.
-
(1980)
Communications of the ACM
, vol.23
, Issue.11
, pp. 627-628
-
-
Hirschberg, D.1
Sinclair, J.2
-
10
-
-
0032218231
-
A practical secure physical random bit generator
-
ACM
-
M. Jakobsson, E. Shriver, B. Hillyer, and A. Juels. A practical secure physical random bit generator. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 103-111. ACM, 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Jakobsson, M.1
Shriver, E.2
Hillyer, B.3
Juels, A.4
-
12
-
-
0017722619
-
Distributed systems, towards a formal approach
-
G. Le Lann. Distributed systems, towards a formal approach. Information processing, 77:155-160, 1977.
-
(1977)
Information Processing
, vol.77
, pp. 155-160
-
-
Le Lann, G.1
-
16
-
-
0018683804
-
Encryption and secure computer networks
-
G. Popek and C. Kline. Encryption and secure computer networks. ACM Computing Surveys (CSUR), 11(4):331-356, 1979.
-
(1979)
ACM Computing Surveys (CSUR)
, vol.11
, Issue.4
, pp. 331-356
-
-
Popek, G.1
Kline, C.2
-
17
-
-
0004007880
-
-
E. Corporation. Wiley Online Library
-
B. Ripley and E. Corporation. Stochastic simulation, volume 21. Wiley Online Library, 1987.
-
(1987)
Stochastic Simulation
, vol.21
-
-
Ripley, B.1
-
18
-
-
85008060937
-
A provably secure true random number generator with built-in tolerance to active attacks
-
B. Sunar, W. Martin, and D. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Transactions on computers, pages 109-119, 2007.
-
(2007)
IEEE Transactions on Computers
, pp. 109-119
-
-
Sunar, B.1
Martin, W.2
Stinson, D.3
|