1. Endowing concurrent Kleene algebra with communication actions;Jaskolka,2014
2. A formulation of the potential for communication condition using C2KA;Jaskolka,2014
3. Trusted computer system evaluation criteria (TCSEC);United States Department of Defense,1985
4. The subliminal channel and digital signatures;Simmons,1985
5. Covert channel vulnerabilities in anonymity systems;Murdoch,2007