Cryptography Reference
In-Depth Information
[261] G.J. Simmons, Subliminal channels: Past and present , Euro. Trans.
Telecommun. 5 (1994), 459-473. ( Cited on page 374. )
[262] G.J. Simmons, Protocols that ensure fairness ,in Codes and Ciphers ,
P.G. Farrell, ed., Royal Agricultural College, Cirencester, 1993 (1995), 13-
15. ( Cited on page 374. )
[263] G.J. Simmons, Results concerning bandwidth of subliminal channels , IEEE
J. Selected Areas Commun. 16 (1998), 463-473. ( Cited on page 374. )
[264] R.C. Singleton Maximum distance q -nary codes , IEEE Transactions on
Information Theory, 10 (1964), 116-118. ( Cited on page 445. )
[265] D. Slepian, Some further theory of group codes , Bell Systems Technical
Journal 39 (1960), 1219-1252. ( Cited on page 451. )
[266] R. Smith and J.R. Emshwiller, 24 Days: How Two Wall Street Journal
Reporters Uncovered the Lies that Destroyed Faith in Corporate America
or Infectious Greed , HarperCollins (2003). ( Cited on page 379. )
[267] E. Spafford, Observing reusable password choices , Proceedings UNIX Se-
curity Symposium III, September (1992). ( Cited on page 330. )
[268] E. Spafford, OPUS: Preventing weak password choices , Computers and
Security, 3 (1992). ( Cited on page 330. )
[269] L. Spitzner, Honeypots: Tracking Hackers , Addison Wesley, Boston
(2002). ( Cited on page 395. )
[270] R. Stallman, Free Software, Free Society: Selected Essays of
Richard M. Stallman , Free Software Foundation (2002). ( Cited on page
387. )
[271] D. Stebila, Elliptic-curve Di ; e-Hellman key exchange for the SSH
transport level protocol , INTERNET-DRAFT, draft-stebila-secsh-ecdh-00 ,
November (2003). ( Cited on page 335. )
[272] M. Steiner, G. Tsudik, and M. Waidner, Refinement and extension of
encrypted key exchange , ACM Operating Systems Review 29 , July (1995).
( Cited on page 200. )
[273] C. Stoll, The Cuckoo's Egg , Pocket Books, New York (2000). ( Cited on
pages 326, 386, 396. )
[274] A. Stubblefield, J. Ioannidis, and A. Rubin, Using the Fluhrer, Mantin,
and Shamir attack to break WEP , in Proceedings of the 2002 Network and
Distributed Systems Security Symposium (2002), 17-22. ( Cited on page
344. )
[275] S. Suehring, SCP/SFTP/SSH URI Format , INTERNET-DRAFT, draft-
ietf-secsh-scp-sftp-ssh-uri-01.txt , October (2003). ( Cited on page 335. )
Search WWH ::




Custom Search