1. Ajtai, M., Komlos, J., Szemeredi, E.: An O(n log n) sorting network. In: Proceedings of the 15th STOC, pp. 1–9 (1983)
2. Anderson, R., Kuhn, M.: Tamper Resistance—A Cautionary Note. In: USENIX E-Commerce Workshop, pp. 1–11. USENIX Press (1996)
3. Anderson, R., Kuhn, M.: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Proc. 2nd Workshop on Information Hiding. Springer, Heidelberg (1998)
4. Lecture Notes in Computer Science;B. Barak,2001
5. Batcher, K.: Sorting Networks and their Applications. In: Proc. AFiPS Spring Joint Conference, vol. 32, pp. 307–314 (1988)