{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:56:41Z","timestamp":1725407801963},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/milcom.2015.7357459","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:54:21Z","timestamp":1450371261000},"page":"300-305","source":"Crossref","is-referenced-by-count":1,"title":["Exhaustive attack analysis of BBC with glowworm for unkeyed jam resistance"],"prefix":"10.1109","author":[{"given":"Leemon C.","family":"Baird","sequence":"first","affiliation":[]},{"given":"Bill","family":"Parks","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Hardware-centric implementation considerations for bbc-based concurrent codecs","author":"bahn","year":"2008","journal-title":"U S Air Force Academy Academy Center for Cyberspace Research Tech Rep USAFA-TR-2008-ACCR-03"},{"key":"ref11","article-title":"Jam resistant communications without shared secrets","author":"bahn","year":"2008","journal-title":"Proceedings of the 3rd International Conference on Information Warfare and Security (ICIW08)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753302"},{"key":"ref13","article-title":"Cryptography for Cyber Security and Defense: Information Encryption and Cyphering","author":"thurimella","year":"0","journal-title":"IGI Global chapter title &#x201C;Network Security"},{"key":"ref14","article-title":"Parallel bbc decoding with little interprocess communication","author":"baird","year":"2009","journal-title":"U S Air Force Academy Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-01"},{"key":"ref15","article-title":"An efficient correlator for implementations of bbc jam resistance","author":"baird","year":"2009","journal-title":"U S Air Force Academy Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-02"},{"key":"ref16","article-title":"An o(log n) running median or running statistic method, for use with bbc jam resistance","author":"baird","year":"2009","journal-title":"U S Air Force Academy Academy Center for Cyberspace Research Tech Rep USAFA-TR-2009-ACCR-03"},{"article-title":"Secure jam resistant key transfer","year":"2008","author":"hamilton","key":"ref17"},{"article-title":"An adaptive jam-resistant cross-layer protocol for mobile ad-hoc networks in noisy environments","year":"2009","author":"kuhr","key":"ref18"},{"article-title":"A single-hop medium access control layer for noisy channels","year":"2009","author":"sanders","key":"ref19"},{"key":"ref4","article-title":"The use of concurrent codes in computer programming and digital signal processing education","author":"bahn","year":"0","journal-title":"Journal of Computing Sciences in College vol 23 no 1 pp 174&#x2013;180 Oct 2007 also in the Proceedings of the 16th Annual Rocky Mountain Conference of the Consortium for Computing Sciences in Colleges (RMCCSC)"},{"key":"ref3","article-title":"Jam-resistant communication without shared secrets through the use of concurrent codes","author":"baird","year":"2007","journal-title":"U S Air Force Academy Tech Rep USAFA-TR-2007-01"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381926"},{"key":"ref5","first-page":"122","article-title":"Impediments to systems thinking: Communities separated by a common language","author":"bahn","year":"2007","journal-title":"Proceedings of the 4th International Conference on Cybernetics and Information (CITSA)"},{"key":"ref8","first-page":"175","article-title":"Visually understanding jam resistant communication","author":"schweitzer","year":"2007","journal-title":"Proceedings of the 3rd International Workshop on Visualization for Computer Security"},{"key":"ref7","article-title":"A new approach for boolean query processing in text information retreival","author":"baird","year":"2007","journal-title":"Proceedings of the International Fuzzy Systems Association (IFSA) 2007 World Congress"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415738"},{"key":"ref1","article-title":"Unkeyed jam resistance 300 times faster: The inchworm hash","author":"baird","year":"2010","journal-title":"Military Communications Conference 2010-MILCOM"},{"key":"ref9","article-title":"Extending critical mark densities in concurrent codecs through the use of interstitial checksum bits","author":"bahn","year":"2008","journal-title":"U S Air Force Academy Academy Center for Cyberspace Research Tech Rep USAFA-TR-2008-ACCR-02"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753170"}],"event":{"name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","start":{"date-parts":[[2015,10,26]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2015,10,28]]}},"container-title":["MILCOM 2015 - 2015 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347040\/7357245\/07357459.pdf?arnumber=7357459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:03:02Z","timestamp":1490385782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7357459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/milcom.2015.7357459","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}