Xxxxxx and P. Ginzboorg. Key-agreement in ad-hoc networks. In Nordsec’99, 1999.
Xxxxxx and P. M.J. Xxxxxx de Xxxx, Air and Space Law: Xx Xxxx Xxxxxxx, Essays in Honour of Xxxxx X. Xxxxxxxxxxx (Xxxxxxxx Xxxxxxx Publishers 1992), p. 76. 195 ICAO Secretariat, “Safety Aspects of Economic Liberalization and Article 83bis”, LC/36-WP/ 2-3, 27/10/15. 196 See ICAO Circular 99-AT/20 (1970): Scandinavian Airline System – Consortium Agreement and Related Agreements.
Xxxxxx and P. Hut. A Hierarchical O(NlogN) Force-Calculation Algorithm. Nature, 324:446– 449, December 1986.
Xxxxxx and P. Hut. Ļe Gravitational Million-Body Problem: A Multidisciplinary Approach to Star Cluster Dynamics. Cambridge University Press, 2003. ISBN 9780521774864. URL http: //xxxxx.xxxxxx.xx/xxxxx?xx=xXX0XXXxXxXX.
Xxxxxx and P. A. Xxxxxxxx. 2010. The mTOR kinase determines effector versus memory CD8+ T cell fate by regulating the expression of transcription factors T-bet and Eomesodermin. Immunity 32:67-78. 115. Joshi, N. S., X. Xxx, X. Xxxxxxxx, X. X. Xxx, X. X. Xxxx, X. Xxxxxx, X. Xxxxx, and X. X. Xxxxx. 2007. Inflammation directs memory precursor and short-lived effector CD8+ T cell fates via the graded expression of T-bet transcription factor. Immunity 27:281-295. 116. Xxxxxxxx, X. X., and S. C. Xxxxxxx. 2007. CD8(+) T cell differentiation: choosing a path through T-bet. Immunity 27:180-182. 117. Pipeling, M. R., E. R. John, X. X. Xxxxx, X. Xxxxxxxx, and X. X. XxXxxx. 2011. Primary cytomegalovirus phosphoprotein 65-specific CD8+ T-cell responses and T-bet levels predict immune control during early chronic infection in lung transplant recipients. J Infect Dis 204:1663-1671. 118. Xiao, Z., X. X. Xxxxx, S. C. Xxxxxxx, X. X. Xxxxxxxxxx, and X. X. Xxxxxxx. 2009. Programming for CD8 T cell memory development requires IL-12 or type I IFN. J Immunol 182:2786-2794. 119. Xxxxx, V., X. Xxxxxx, and X. Xxxxx. 2010. CD8 T-cell memory differentiation during acute and chronic viral infections. Adv Exp Med Biol 684:79-95. 120. Xxxxxx, E. L., X. X. Xxxxxx, G. A. Martins, X. X. Xxxxxxxx, A. S. Xxxxxxxx, X. X. Xxxxxx, X. Xxxxxx, X. X. XxXxxxxxx, X. X. Xxxxx, C. A. Mao, X. Xxxx, N. Cereb, X. X. Xxxx, X. Xxxxxxxx, J. Rossant, C. A. Hunter, and X. X. Xxxxxx. 2003. Control of effector CD8+ T cell function by the transcription factor Eomesodermin. Science 302:1041-1043. 121. Xxxxxx, V., and F. L. Xxxxxx. 2002. The T-box family. Genome Biol 3:REVIEWS3008. 122. Jabbari, A., and X. X. Xxxxx. 2005. Cutting edge: differential self-peptide/MHC requirement for maintaining CD8 T cell function versus homeostatic proliferation. J Immunol 175:4829-4833. 123. Murali-Krishna, K., L. L. Xxx, X. Xxxxxxxx, X. Xxxxxxxxx, X. Xxxxxx, and X. Xxxxx. 1999. Persistence of memory CD8 T cells in MHC class I-deficient mice. Science 286:1377-1381. 124. Martins, G., and X. Xxxxxx. 2008. Regulation and functions of Blimp-1 in T and B lymphocytes. Annu Rev Immunol 26:133-169. 125. Xxxxx, X. X. 2009. Blimp hovers over T cell immunity. Immunity 31:178-180. 126. Shin, H., S. D. Xxxxxxxxx, A. M. Xxxxxxxxxx, X. Xxx, X. X. Xxxxxxxxxxx, X. X. Xxxxxx, and X. X. Xxxxxx. 2009. A role for the transcriptional repressor Blimp-1 in CD8(+) T cell exhaustion during chronic viral infection. Immunity 31:309-320. 127. Xxxxxxxxxxx, X. X., G. A. Mart...
Xxxxxx and P. Ginzboorg. Key Agreement in Ad-hoc Networks, February 2000. Expanded version of a talk given at the Nordsec ’99 workshop.
Xxxxxx and P. Ginzboorg. Key agreement in ad hoc networks. In Computer Comm., volume 23, pages 1627–1637, 2000.
Xxxxxx and P. Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications, 23(17):1627–1637, November 2000. [7] X. Xxxx, X. Xxxxxxxxx, and X. Xxxxx. Simple Key-Management for Internet Protocol (SKIP). In INET’95. xxxx://xxx.xxxx.xxx/HMP/PAPER/244/abst.html. [8] X. Xxxxxxx, X. Xxxxxxxx, X. Xxxxxxx, and
Xxxxxx and P. Ginzboorg, “Key-Agreement in Ad-hoc Networks”, Computer Communications, vol. 23, no. 17, pp. 1627–1637, 2000.
Xxxxxx and P. Ginzboorg. Key Agreement in Ad-hoc Networks, February 2000. Expanded version of a talk given at the Nordsec ’99 workshop. [1, 10] 2. X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. New Multiparty Authentication Services and Key Agreement Protocols. IEEE J. of Selected Areas in Communications, Apr. 2000. [1]