| |
All Publications
Neal R. Wagner
|
Refereed journal articles:
- Wagner, N.R. ``The space of retractions of the 2-sphere and the annulus,"
Transactions of the American Mathematical Society, Vol. 158 (1971),
No. 2, pp. 319-329.
PDF copy.
- Wagner, N.R. ``The space of retractions of a 2-manifold,"
Proceedings of the American Mathematical Society,
Vol. 34 (1972), No. 2, pp. 609-614.
PDF copy.
- Wagner, N.R. ``Constructions with pentacubes," Journal of
Recreational Mathematics, Vol. 5 (1972), No. 4, pp. 266-268.
PDF copy.
- Wagner, N.R. ``Constructions with pentacubes II," Journal of
Recreational Mathematics, Vol. 6 (1973), No. 3, pp. 211-214.
PDF copy.
- Wagner, N.R. ``A continuity property and surface topology,
Bulletin of the American Mathematical Society,
Vol. 79 (1973), No. 6, pp. 1308-1311.
PDF copy.
- Wagner, N.R. ``A continuity property with applications to the
topology of 2-manifolds," Transactions of the American Mathematical
Society, Vol. 200 (1975), pp. 369-393.
PDF copy.
- Wagner, N.R. ``The sofa problem," American Mathematical Monthly,
Vol. 83 (1976), No. 3, pp. 188-189.
PDF copy. [See
Moving
sofa problem, which references this article. See also
Two-way
Sofa.]
- Wagner, N.R. ``The faceless clock," Mathematics Teacher,
Vol. 70 (1977), No. 9, p. 765. (Short note.)
PDF copy.
- Wagner, N.R. ``A Fortran preprocessor for the large program environment,"
SIGPLAN Notices, Vol. 15 (1980), No. 12, pp. 92-103.
PDF copy.
- Putter, P.S., and Wagner, N.R. ``Technical Correspondence"
(related to the article ``Pass Algorithms: A User Validation Scheme
Based on Knowledge of Secret Algorithms"),
Communications of the ACM, Vol. 28 (July, 1985), No. 8, p. 750.
PDF copy.
- Wagner, N.R., ``Technical Correspondence" (related to the article
``Novel Security Techniques for On-line Systems"),
Communications of the ACM, Vol. 29 (1986), No. 12, pp. 1240-1241.
- Wagner, N.R., and Putter, P.S., ``Error detecting decimal digits,"
Communications of the ACM, Vol. 32, No. 1 (Jan., 1989),
pp. 106-110.
PDF copy,
Review (PDF),
Follow up Technical Correspondence1,
Follow up Technical Correspondence2.
- Robbins, K.A., Wagner, N.R., and Wenzel, D.J.,
``Virtual rings: an introduction to concurrency,"
SIGCSE Bulletin, Vol. 21, No. 2 (June, 1989), pp. 23-28,
PDF copy.
- Wagner, N.R., and Putter, P.S., ``Authors' Response" to
``Technical Correspondence" (related to the article ``Error detecting
decimal digits"), Communications of the ACM, Vol. 32 (1989),
No. 9, pp. 1132.
|
Refereed conference
proceedings:
- Müller-Schloer, C. and Wagner, N.R. ``The implementation of a
cryptography-based secure office system," AFIPS Conference Proceedings:
1982 National Computer Conference (Houston, Texas), AFIPS Press,
pp. 487-492.
PDF copy.
- Wagner, N.R. ``Shared database access using composed encryption
functions," Proceedings of the 1982 Symposium on Security and Privacy,
IEEE Computer Society, pp. 104-110.
PDF copy.
- Müller-Schloer, C. and Wagner, N.R. ``Cryptographic protection of
personal data cards," Advances in Cryptology: Proceedings of Crypto 82,
ed. by D. Chaum et al., Plenum Press, 1983, pp. 219-229.
- Wagner, N.R. ``Fingerprinting," Proceedings of the 1983
Symposium on Security and Privacy, IEEE Computer Society, pp. 18-22.
PDF copy.
- Wagner, N.R. ``Searching for public-key cryptosystems,"
Proceedings of the 1984 Symposium on Security and Privacy,
IEEE Computer Society, pp. 91-98.
(This article was superseded by the following article.)
- Wagner, N.R. and Magyarik, M.R., ``A public-key cryptosystem based
on the word problem," Advances in Cryptology: Proceedings of Crypto 84,
Lecture Notes in Computer Science No. 196, ed. by G.R. Blakley
and D. Chaum, Springer Verlag, pp. 19-36.
PDF copy,
related material,
2006 seminar in this area.
- Wagner, N.R., Putter, P.S., and Cain, M.R., ``Using algorithms as
keys in cryptosystems," Proceedings of Eurocrypt 85,
Lecture Notes in Computer Science No. 219, ed. by F. Pichler,
Springer Verlag, pp. 149-155.
PDF copy.
- Wagner, N.R., Putter, P.S., and Cain, M.R., ``Encrypted database design:
Specialized approaches," Proceedings of the 1986 Symposium on Security and
Privacy, IEEE Computer Society, pp. 148-153.
PDF copy.
- Wagner, N.R., Putter, P.S., and Cain, M.R., ``Large scale randomization
techniques in cryptography," Advances in Cryptology--Crypto 86,
Lecture Notes in Computer Science No. 263,
Springer Verlag, 1986, pp. 393-404.
PDF copy.
- Wagner, N.R., Fountain, R. L., and Hazy, R.J.,
``The fingerprinted database,"
Sixth International Conference on Data Engineering: Proceedings,
IEEE Computer Society Press, 1990, pp. 330-336.
PDF copy.
- Wagner, N.R., ``Randomized fault-detecting leader election in
a bi-directional ring," Proceedings of the Second Annual IEEE
Symposium on Parallel & Distributed Processing,
IEEE Computer Society Press, 1990, pp. 506-510.
PDF copy.
- Wagner, N.R., ``The logistic lattice in random number generation,''
Proceedings of the Thirtieth Annual Allerton Conference on Communications,
Control, and Computing, Coordinated Science Lab and Department
of Electrical and Computer Engineering, University of
Illinois at Urbabn-Champaign, 1993, pp. 922-931.
PDF copy.
|
|