Cryptography Reference
In-Depth Information
Bibliography
Adida, Ben, and Ronald L. Rivest. “Scratch and Vote: Self-Contained Paper-Based
Cryptographic Voting.” In Proceedings of the 5th ACM Workshop on Privacy in Electronic
Society , ed. Ben Adida and Ronald L. Rivest, 29-40. New York: ACM, 2006.
Adleman, Leonard M. “Computing with DNA.” Scientific American 279, no. 8 (August
1998): 34-41.
Agrawal, Dakshi, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. “The EM
Side-Channel (S).” In Cryptographic Hardware and Embedded Systems—CHES 2002 , ed.
Burton S. Kaliski, 29-45. Berlin: Springer, 2003.
Agre, Philip E. Computation and Human Experience . Cambridge: Cambridge University
Press, 1997.
Agre, Philip E. “Toward a Critical Technical Practice: Lessons Learned in Trying to
Reform AI.” In Social Science, Technical Systems, and Cooperative Work: Beyond the Great
Divide , ed. Geof Bowker, Les Gasser, Leigh Star, and Bill Turner, 131-157. Hillsdale,
NJ: Lawrence Erlbaum Associates, 1997.
Agre, Philip E. “Conceptions of the User in Computer Systems Design.” In Social
and Interactional Dimensions of Human-Computer Interfaces , ed. Peter J. Thomas, 67-
106. Cambridge: Cambridge University Press, 1995.
Alder, Ken. The Lie Detectors: The History of an American Obsession . New York: Free
Press, 2007.
Alder, Ken. “Reading Characters: French Handwriting Experts from the Counter-
Reformation to the Dreyfus Affair.” Paper presented at the Berlin Summer Academy
on Law, Science, and Technology, Max-Planck-Institut für Wissenschaftsgeschichte,
Berlin, August 16-27, 1999.
American Bar Association. “Digital Signature Guidelines: Legal Infrastructure for
Certification Authorities and Secure Electronic Commerce.” Chicago: American Bar
Association, August 1, 1996.
Search WWH ::




Custom Search