Cryptography Reference
In-Depth Information
Chaum, David, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, and Josh
Benaloh, eds., Towards Trustworthy Elections: New Directions in Electronic Voting . Berlin:
Springer, 2010.
Ciborra, Claudio. The Labyrinths of Information: Challenging the Wisdom of Systems .
Oxford: Oxford University Press, 2002.
Clanchy, Michael T. From Memory to Written Record, England 1066-1307 . 2nd ed.
Oxford: Blackwell, 1993.
Cole, Simon A. Suspect Identities: A History of Fingerprinting and Criminal Identification. .
Cambridge, MA: Harvard University Press, 2002.
Conseil d'État. Internet et les réseaux numériques . Paris: La documentation
française, 1998.
Coombe, Rosemary J. The Cultural Life of Intellectual Properties: Authorship, Appropria-
tion, and the Law . Durham, NC: Duke University Press, 1998.
Constance, Paul. “How Jim Bamford Probed the NSA.” Cryptologia 21, no. 1 (1997):
71-74.
Copeland, Jack B. Colossus: The Secrets of Bletchley Park's Code-breaking Computers .
Oxford: Oxford University Press, 2006.
Coron, Jean-Sébastien, Jacques Patarin, and Yannick Seurin. “The Random Oracle
Model and the Ideal Cipher Model Are Equivalent.” In Advances in Cryptology—
CRYPTO 2008 , ed. David Wagner, 1-20. Berlin: Springer-Verlag, 2008.
Cranor, Lorrie Faith, and Simson Garfinkel, eds. Security and Usability: Designing
Secure Systems That People Can Use . Sebastopol, CA: O'Reilly Media, 2005.
Crowley, John. “Uses and Abuses of the Secret Ballot in the American Age of
Reform.” In Cultures of Voting: The Hidden History of the Secret Ballot , ed. Romain
Bertrand, Jean-Louis Briquet, and Peter Pels, 43-68. London: Hurst & Co, 2007.
Curtin, Matt. Brute Force: Cracking the Data Encryption Standard . New York: Coperni-
cus Books, 2005.
Dam, Kenneth W., and Herbert S. Lin, eds. Cryptography's Role in Securing the Informa-
tion Society (CRISIS) . Washington, DC: National Academy Press, 1996.
Damgård, Ivan. “A 'Proof-Reading' of Some Issues in Cryptography.” In Automata,
Languages, and Programming , ed. Lars Arge, Christian Cachin, Tomasz Jurdzinski, and
Andrzey Tarlecki, 2-11. Berlin: Springer-Verlag, 2007.
Datamonitor. Public Key Infrastructure, 1999-2003 . n.p., 1999.
Davida, George. Chosen Signature Cryptanalysis of the RSA (MIT) Public Key Cryptosys-
tem . Technical Report TR-CS-82-2, Department of Electrical and Computer Science,
University of Wisconsin, 1982.
Search WWH ::




Custom Search