{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:28Z","timestamp":1755216688481,"version":"3.43.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/milcom.2012.6415738","type":"proceedings-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T12:24:53Z","timestamp":1359635093000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["The Glowworm hash: Increased speed and security for BBC unkeyed jam resistance"],"prefix":"10.1109","author":[{"given":"Leemon C.","family":"Baird","sequence":"first","affiliation":[{"name":"Academy Center for Cyberspace Research, Computer Science Department, US Air Force Academy, USAFA, Colorado 80840"}]},{"given":"Martin C.","family":"Carlisle","sequence":"additional","affiliation":[{"name":"Academy Center for Cyberspace Research, Computer Science Department, US Air Force Academy, USAFA, Colorado 80840"}]},{"given":"William L.","family":"Bahn","sequence":"additional","affiliation":[{"name":"Academy Center for Cyberspace Research, Computer Science Department, US Air Force Academy, USAFA, Colorado 80840"}]},{"given":"Eric","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753170"},{"journal-title":"An Adaptive Jam-resistant Cross-layer Protocol for Mobile Adhoc Networks in Noisy Environments","year":"2009","author":"kuhr","key":"17"},{"key":"18","article-title":"A single-hop medium access control layer for noisy channels","author":"sanders","year":"2009","journal-title":"Auburn Univeristy Tech Rep"},{"key":"15","article-title":"An o(log n) running median or running statistic method, for use with bbc jam resistance","author":"baird iii","year":"2009","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-03"},{"journal-title":"Secure Jam Resistant Key Transfer","year":"2008","author":"hamilton","key":"16"},{"key":"13","article-title":"Parallel bbc decoding with little interprocess communication","author":"baird iii","year":"2009","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-01"},{"key":"14","article-title":"An efficient correlator for implementations of bbc jam resistance","author":"baird iii","year":"2009","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-02"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753302"},{"journal-title":"Cryptography for Cyber Security and Defense Information Encryption and Cyphering","year":"2009","author":"thurimella","key":"12"},{"key":"21","article-title":"Security analysis of bbc coding","author":"baird iii","year":"2008","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2008-ACCR-01"},{"key":"3","first-page":"174","article-title":"The use of concurrent codes in computer programming and digital signal processing education","volume":"23","author":"bahn","year":"2007","journal-title":"Journal of Computing Sciences in College"},{"journal-title":"FIPS PUB 180-1 Secure Hash Standard","year":"1995","key":"20"},{"key":"2","article-title":"Jam-resistant communication without shared secrets through the use of concurrent codes","author":"baird iii","year":"2007","journal-title":"U S Air Force Academy Tech Rep USAFA-TR-2007-01"},{"key":"1","article-title":"Unkeyed jam resistance 300 times faster: The inchworm hash","author":"baird iii","year":"2010","journal-title":"Military Communications Conference 2010-MILCOM"},{"key":"10","article-title":"Jam resistant communications without shared secrets","author":"bahn","year":"2008","journal-title":"Proceedings of 2nd International Conference on Information Warfare and Security"},{"key":"7","first-page":"175","article-title":"Visually understanding jam resistant communication","author":"schweitzer","year":"2007","journal-title":"Proc IEEE Workshops Visualization for Computer Security"},{"key":"6","article-title":"A new approach for Boolean query processing in text information retreival","author":"baird iii","year":"2007","journal-title":"Proceedings of the International Fuzzy Systems Association (IFSA) 2007 World Congress"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381926"},{"key":"4","first-page":"122","article-title":"Impediments to systems thinking:Communities separated by a common language","author":"bahn","year":"2007","journal-title":"Proceedings of the 4th International Conference on Cybernetics and Information (CITSA)"},{"key":"9","article-title":"Hardware-centric implementation considerations for bbc-basedconcurrent codecs","author":"bahn","year":"2008","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2008-ACCR-03"},{"key":"8","article-title":"Extending critical mark densities in concurrent codecs through the use of interstitial checksum bits","author":"bahn","year":"2008","journal-title":"Academy Center for Cyberspace Research Tech Rep USAFA-TR-2008-ACCR-02"}],"event":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","start":{"date-parts":[[2012,10,29]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,11,1]]}},"container-title":["MILCOM 2012 - 2012 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6383191\/6415559\/06415738.pdf?arnumber=6415738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:34:59Z","timestamp":1754332499000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6415738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/milcom.2012.6415738","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}