Cryptography Reference
In-Depth Information
[261] G.J. Simmons,
Subliminal channels: Past and present
, Euro. Trans.
Telecommun.
5
(1994), 459-473. (
Cited on page 374.
)
[262] G.J. Simmons,
Protocols that ensure fairness
,in
Codes and Ciphers
,
P.G. Farrell, ed., Royal Agricultural College, Cirencester, 1993 (1995), 13-
15. (
Cited on page 374.
)
[263] G.J. Simmons,
Results concerning bandwidth of subliminal channels
, IEEE
J. Selected Areas Commun.
16
(1998), 463-473. (
Cited on page 374.
)
[264] R.C. Singleton
Maximum distance
q
-nary codes
, IEEE Transactions on
Information Theory,
10
(1964), 116-118. (
Cited on page 445.
)
[265] D. Slepian,
Some further theory of group codes
, Bell Systems Technical
Journal
39
(1960), 1219-1252. (
Cited on page 451.
)
[266] R. Smith and J.R. Emshwiller,
24 Days: How Two Wall Street Journal
Reporters Uncovered the Lies that Destroyed Faith in Corporate America
or Infectious Greed
, HarperCollins (2003). (
Cited on page 379.
)
[267] E. Spafford,
Observing reusable password choices
, Proceedings UNIX Se-
curity Symposium III, September (1992). (
Cited on page 330.
)
[268] E. Spafford,
OPUS: Preventing weak password choices
, Computers and
Security,
3
(1992). (
Cited on page 330.
)
[269] L. Spitzner,
Honeypots: Tracking Hackers
, Addison Wesley, Boston
(2002). (
Cited on page 395.
)
[270] R. Stallman,
Free Software, Free Society: Selected Essays of
Richard M. Stallman
, Free Software Foundation (2002). (
Cited on page
387.
)
[271] D. Stebila,
Elliptic-curve Di
;
e-Hellman key exchange for the SSH
transport level protocol
, INTERNET-DRAFT,
draft-stebila-secsh-ecdh-00
,
November (2003). (
Cited on page 335.
)
[272] M. Steiner, G. Tsudik, and M. Waidner,
Refinement and extension of
encrypted key exchange
, ACM Operating Systems Review
29
, July (1995).
(
Cited on page 200.
)
[273] C. Stoll,
The Cuckoo's Egg
, Pocket Books, New York (2000). (
Cited on
pages 326, 386, 396.
)
[274] A. Stubblefield, J. Ioannidis, and A. Rubin,
Using the Fluhrer, Mantin,
and Shamir attack to break WEP
, in Proceedings of the 2002 Network and
Distributed Systems Security Symposium (2002), 17-22. (
Cited on page
344.
)
[275] S. Suehring,
SCP/SFTP/SSH URI Format
, INTERNET-DRAFT,
draft-
ietf-secsh-scp-sftp-ssh-uri-01.txt
, October (2003). (
Cited on page 335.
)
Search WWH ::
Custom Search