Cryptography Reference
In-Depth Information
Bibliography
[AFYZ04]
James Aspnes, Joan Feigenbaum, Aleksandr Yampol-
skiy, and Sheng Zhong. Towards a theory of data en-
tanglement. In Proceedings of the 2004 European Sym-
posium on Research in Computer Security , 2004.
[Age95]
National Security Agency. N.S.A. press release: Venona
documents released. Technical report, National Secu-
rity Agency, July 1995.
[AHU83]
A.V. Aho, J.E. Hopcroft, and J.D. Ullman. Data Structures
and Algorithms . Addison-Wesley, Reading, MA, 1983.
[AK91]
Dana Angluin and Michael Kharitonov. When won't
membership queries help? In Proceedings of the
Twenty-Third Annual ACM Symposium on Theory of
Computing , pages 444-454. ACM Press, 1991. to appear
in JCSS .
[AKSK00]
S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and
K.R.Rao. Exploring steganography for low bit rate
wavelet based coder in image retrieval system. In Pro-
ceedings of TENCOM '00 , volume 3, pages 250-255,
Kuala Lumpur, Malaysia, September 2000.
[AMRN00] Mikhail J. Atallah, Craig J. McDonough, Victor Raskin,
and Sergei Nirenburg. Natural language processing for
information assurance and security: an overview and
implementations. In NSPW '00: Proceedings of the 2000
workshop onNew security paradigms , pages 51-65, New
York, NY, USA, 2000. ACM.
[And96a]
R. Anderson. The eternity service, 1996.
[And96b]
Ross J. Anderson, editor. Information Hiding, First In-
ternational Workshop, Cambridge, U.K., May 30 - June 1,
Search WWH ::




Custom Search