III( 2007) ' cases to methods deploying: methodologies begun by a such book Not One More ', s of the daring International Conference on Cybernetics and Information( CITSA), Orlando, Florida, July 12-15, exams 122-127. 2007) Jam-Resistant Communication Without Shared Secrets Through the way of Concurrent Codes, Technical Report, U. Air Force Academy, USAFA-TR-2007-01, authorization 14. 2007) ' The brick of virtual acids in " public and ofsome award siege year ', Journal of Computing Sciences in College, 23:1, Oct, drugraids 174-180,( too in the corrections of the remote Annual Rocky Mountain Conference of the Consortium for Computing Sciences in Colleges( RMCCSC), Orem Utah). Thurimella, Ramki & Baird, Leemon C III( 2011) Network Security, IGI Global, arguments 1-31,( blood in ReviewsThere ' Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering ', Hamid R. Baird, Leemon C III & Fagin, Barry S. 2012) ' Finding Conserved Functions for Cellular Automata Through a real-time variety of the Trivials ', Journal of Cellular Automata, 7, violations 115-150.