bullet"Macdonald's Theorem for Quadratic Jordan Algebras," Pacific Journal of Mathematics, 35, (1970), 681-706 (co-author).
bullet"Hereditary Radicals in Jordan Rings," Proceedings of the American Mathematical Society, 33, (1972), 302-306.
bullet"Extending a Jordan Ring Homomorphism," Proceedings of the American Mathematical Society, 40, (1975), 57-59.
bulletSentence Helpers, Media Materials, Inc., Baltimore (1982) (co-author). (This is software whose purpose is to teach the formation of properly constructed sentences.)
bullet"Induction and Recursion," Collegiate Microcomputer, v.2, n.2, (May 1984).
bullet"Artificial Intelligence," The Goucher Quarterly, v.63, n.4, (Summer 1985).
bullet"The Relation between Parsimonious Covering Theory and Competition-Based Spreading Activation," TR-1580, University of Maryland Department of Computer Science, July 1986.
bullet"A Case Study in Building an Expert System," Proceedings of the Third Annual Eastern Small College Computing Conference, October 1987. (Reprinted in the Journal of Computing in Small Colleges, February 1988).
bulletExpert System Development, Q.E.D. Information Services, (1988) (co-author).
bulletIntelligent Systems Design, John Wiley & Sons, (1990) (co-author).
bullet"Fibonacci Melodies," Humanistic Mathematics Journal, 14, (November 1996), 36-39
bulletCryptological Mathematics, Mathematical Association of America Press, (2000)
bullet"International Mathematical Experiences," Math Horizons, (September 2006)
bullet"A Cryptology Course at Bletchley Park," Cryptologia, v.31, n.2, (April 2007)
bullet "Cryptology in a Liberal Arts Setting," Journal of Mathematics and Computer Education, v.41, n.3, (Fall 2007).
bullet "The Perfect Cipher," The Mathematical Gazette, v.94, n.531, (Fall 2010)
bullet "Secret Keeping 101 - Dr. Janice Martin Benario and the Women's College Connection to ULTRA," Cryptologia, v. 35, n.1, (Winter 2011)