Cryptography Reference
In-Depth Information
Jasanoff, Sheila.
Science at the Bar: Law, Science, and Technology in America
. Cambridge,
MA: Harvard University Press, 1995.
Jefferson, David, Aviel D. Rubin, Barbara Simons, and David Wagner. “Analyzing
Internet Voting Security.”
Communications of the ACM
47, no. 10 (2004): 59-64.
Jermyn, Ian, Alain Mayer, Fabien Monrose, Michael K. Reiter, and Aviel Rubin. “The
Design and Analysis of Graphical Passwords.” In
Proceedings of the 8th Conference on
USENIX Security Symposium
, 1-14. Berkeley: USENIX Association, 1999.
Jospin, Lionel.
Préparer l'entrée de la France dans la société de l'information
. Speech by
the prime minister at the 18th Université d'été de la communication, Hourtin, August
25, 1997. http://www.admiroutes.asso.fr/action/theme/politic/lionel.htm (accessed
June 25, 2011).
Jospin, Lionel.
Société de l'information
. Speech by the prime minister at the 20th
Université d'été de la communication, Hourtin, August 26, 1999. http://www.medi-
asinfos.com/Download/jospin260899.htm (accessed June 25, 2011).
Juola, Patrick. “Whole-Word Phonetic Distances and the PGPfone Alphabet.” In
Proceedings of the Fourth International Conference on Spoken Language, ICSLP 96
(1996),
98-101.
Kahn, David.
The Codebreakers: The Story of Secret Writing
. New York: Macmillan,
1967.
Kahn, David. “The CRYPTO '82 Conference, Santa Barbara. A Report on a Confer-
ence.”
Cryptologia
7, no. 1 (1983): 1-5.
Kahn, David. “EUROCRYPT 83: A Report.”
Cryptologia
7, no. 3 (1983): 254-256.
Kahn, David.
The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of Ameri-
can Codebreaking
. New Haven: Yale University Press, 2004.
Kaliski, Burton S., Jr. “Emerging Standards for Public-Key Cryptography.” In
Lectures
on Data Security: Modern Cryptology in Theory and Practice
, ed. Ivan Damgård, 87-104.
Berlin: Springer, 1999.
Kaliski, Burton, and Jessica Staddon. “Public-Key Cryptography Standards (PKCS)
#1: RSA Cryptography Specifications Version 2.0.” RSA Laboratories, 1998.
Kelly, Kevin.
Out of Control: The New Biology of Machines, Social Systems, and the
Economic World
. Reading, MA: Addison-Wesley, 1994.
Kerckhoffs, Auguste. “La cryptographie militaire.”
Journal des Sciences Militaires
9
(1883): 5-38.
Kessler, Jack. “Networked Information in France, 1993: The Internet's Future.”
Inter-
net Research
4, no. 1 (1994): 18-30.
Koblitz, Neal, and Alfred J. Menezes. “Another Look at 'Provable Security.'”
Journal
of Cryptology
20, no. 1 (2007): 3-37.