All Publications
Neal R. Wagner

Refereed journal articles:
  1. Wagner, N.R. ``The space of retractions of the 2-sphere and the annulus," Transactions of the American Mathematical Society, Vol. 158 (1971), No. 2, pp. 319-329. PDF copy.

  2. Wagner, N.R. ``The space of retractions of a 2-manifold," Proceedings of the American Mathematical Society, Vol. 34 (1972), No. 2, pp. 609-614. PDF copy.

  3. Wagner, N.R. ``Constructions with pentacubes," Journal of Recreational Mathematics, Vol. 5 (1972), No. 4, pp. 266-268. PDF copy.

  4. Wagner, N.R. ``Constructions with pentacubes II," Journal of Recreational Mathematics, Vol. 6 (1973), No. 3, pp. 211-214. PDF copy.

  5. Wagner, N.R. ``A continuity property and surface topology, Bulletin of the American Mathematical Society, Vol. 79 (1973), No. 6, pp. 1308-1311. PDF copy.

  6. Wagner, N.R. ``A continuity property with applications to the topology of 2-manifolds," Transactions of the American Mathematical Society, Vol. 200 (1975), pp. 369-393. PDF copy.

  7. Wagner, N.R. ``The sofa problem," American Mathematical Monthly, Vol. 83 (1976), No. 3, pp. 188-189. PDF copy. [See Moving sofa problem, which references this article. See also Two-way Sofa.]

  8. Wagner, N.R. ``The faceless clock," Mathematics Teacher, Vol. 70 (1977), No. 9, p. 765. (Short note.) PDF copy.

  9. Wagner, N.R. ``A Fortran preprocessor for the large program environment," SIGPLAN Notices, Vol. 15 (1980), No. 12, pp. 92-103. PDF copy.

  10. Putter, P.S., and Wagner, N.R. ``Technical Correspondence" (related to the article ``Pass Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms"), Communications of the ACM, Vol. 28 (July, 1985), No. 8, p. 750. PDF copy.

  11. Wagner, N.R., ``Technical Correspondence" (related to the article ``Novel Security Techniques for On-line Systems"), Communications of the ACM, Vol. 29 (1986), No. 12, pp. 1240-1241.

  12. Wagner, N.R., and Putter, P.S., ``Error detecting decimal digits," Communications of the ACM, Vol. 32, No. 1 (Jan., 1989), pp. 106-110. PDF copy Review (PDF) Follow up Technical Correspondence1 Follow up Technical Correspondence2.

  13. Robbins, K.A., Wagner, N.R., and Wenzel, D.J., ``Virtual rings: an introduction to concurrency," SIGCSE Bulletin, Vol. 21, No. 2 (June, 1989), pp. 23-28, PDF copy.

  14. Wagner, N.R., and Putter, P.S., ``Authors' Response" to ``Technical Correspondence" (related to the article ``Error detecting decimal digits"), Communications of the ACM, Vol. 32 (1989), No. 9, pp. 1132.

Refereed conference proceedings:
  1. Müller-Schloer, C. and Wagner, N.R. ``The implementation of a cryptography-based secure office system," AFIPS Conference Proceedings: 1982 National Computer Conference (Houston, Texas), AFIPS Press, pp. 487-492. PDF copy.

  2. Wagner, N.R. ``Shared database access using composed encryption functions," Proceedings of the 1982 Symposium on Security and Privacy, IEEE Computer Society, pp. 104-110. PDF copy.

  3. Müller-Schloer, C. and Wagner, N.R. ``Cryptographic protection of personal data cards," Advances in Cryptology: Proceedings of Crypto 82, ed. by D. Chaum et al., Plenum Press, 1983, pp. 219-229.

  4. Wagner, N.R. ``Fingerprinting," Proceedings of the 1983 Symposium on Security and Privacy, IEEE Computer Society, pp. 18-22. PDF copy.

  5. Wagner, N.R. ``Searching for public-key cryptosystems," Proceedings of the 1984 Symposium on Security and Privacy, IEEE Computer Society, pp. 91-98. (This article was superseded by the following article.)

  6. Wagner, N.R. and Magyarik, M.R., ``A public-key cryptosystem based on the word problem," Advances in Cryptology: Proceedings of Crypto 84, Lecture Notes in Computer Science No. 196, ed. by G.R. Blakley and D. Chaum, Springer Verlag, pp. 19-36. PDF copy, related material, 2006 seminar in this area.

  7. Wagner, N.R., Putter, P.S., and Cain, M.R., ``Using algorithms as keys in cryptosystems," Proceedings of Eurocrypt 85, Lecture Notes in Computer Science No. 219, ed. by F. Pichler, Springer Verlag, pp. 149-155. PDF copy.

  8. Wagner, N.R., Putter, P.S., and Cain, M.R., ``Encrypted database design: Specialized approaches," Proceedings of the 1986 Symposium on Security and Privacy, IEEE Computer Society, pp. 148-153. PDF copy.

  9. Wagner, N.R., Putter, P.S., and Cain, M.R., ``Large scale randomization techniques in cryptography," Advances in Cryptology--Crypto 86, Lecture Notes in Computer Science No. 263, Springer Verlag, 1986, pp. 393-404. PDF copy.

  10. Wagner, N.R., Fountain, R. L., and Hazy, R.J., ``The fingerprinted database," Sixth International Conference on Data Engineering: Proceedings, IEEE Computer Society Press, 1990, pp. 330-336. PDF copy.

  11. Wagner, N.R., ``Randomized fault-detecting leader election in a bi-directional ring," Proceedings of the Second Annual IEEE Symposium on Parallel & Distributed Processing, IEEE Computer Society Press, 1990, pp. 506-510. PDF copy.

  12. Wagner, N.R., ``The logistic lattice in random number generation,'' Proceedings of the Thirtieth Annual Allerton Conference on Communications, Control, and Computing, Coordinated Science Lab and Department of Electrical and Computer Engineering, University of Illinois at Urbabn-Champaign, 1993, pp. 922-931. PDF copy.