Cryptography Reference
In-Depth Information
Bibliography
[AFYZ04]
James Aspnes, Joan Feigenbaum, Aleksandr Yampol-
skiy, and Sheng Zhong. Towards a theory of data en-
tanglement. In
Proceedings of the 2004 European Sym-
posium on Research in Computer Security
, 2004.
[Age95]
National Security Agency. N.S.A. press release: Venona
documents released. Technical report, National Secu-
rity Agency, July 1995.
[AHU83]
A.V. Aho, J.E. Hopcroft, and J.D. Ullman.
Data Structures
and Algorithms
. Addison-Wesley, Reading, MA, 1983.
[AK91]
Dana Angluin and Michael Kharitonov. When won't
membership queries help? In
Proceedings of the
Twenty-Third Annual ACM Symposium on Theory of
Computing
, pages 444-454. ACM Press, 1991. to appear
in
JCSS
.
[AKSK00]
S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and
K.R.Rao. Exploring steganography for low bit rate
wavelet based coder in image retrieval system. In
Pro-
ceedings of TENCOM '00
, volume 3, pages 250-255,
Kuala Lumpur, Malaysia, September 2000.
[AMRN00] Mikhail J. Atallah, Craig J. McDonough, Victor Raskin,
and Sergei Nirenburg. Natural language processing for
information assurance and security: an overview and
implementations. In
NSPW '00: Proceedings of the 2000
workshop onNew security paradigms
, pages 51-65, New
York, NY, USA, 2000. ACM.
[And96a]
R. Anderson. The eternity service, 1996.
[And96b]
Ross J. Anderson, editor.
Information Hiding, First In-
ternational Workshop, Cambridge, U.K., May 30 - June 1,