Cryptography Reference
In-Depth Information
Jasanoff, Sheila. Science at the Bar: Law, Science, and Technology in America . Cambridge,
MA: Harvard University Press, 1995.
Jefferson, David, Aviel D. Rubin, Barbara Simons, and David Wagner. “Analyzing
Internet Voting Security.” Communications of the ACM 47, no. 10 (2004): 59-64.
Jermyn, Ian, Alain Mayer, Fabien Monrose, Michael K. Reiter, and Aviel Rubin. “The
Design and Analysis of Graphical Passwords.” In Proceedings of the 8th Conference on
USENIX Security Symposium , 1-14. Berkeley: USENIX Association, 1999.
Jospin, Lionel. Préparer l'entrée de la France dans la société de l'information . Speech by
the prime minister at the 18th Université d'été de la communication, Hourtin, August
25, 1997. http://www.admiroutes.asso.fr/action/theme/politic/lionel.htm (accessed
June 25, 2011).
Jospin, Lionel. Société de l'information . Speech by the prime minister at the 20th
Université d'été de la communication, Hourtin, August 26, 1999. http://www.medi-
asinfos.com/Download/jospin260899.htm (accessed June 25, 2011).
Juola, Patrick. “Whole-Word Phonetic Distances and the PGPfone Alphabet.” In
Proceedings of the Fourth International Conference on Spoken Language, ICSLP 96 (1996),
98-101.
Kahn, David. The Codebreakers: The Story of Secret Writing . New York: Macmillan,
1967.
Kahn, David. “The CRYPTO '82 Conference, Santa Barbara. A Report on a Confer-
ence.” Cryptologia 7, no. 1 (1983): 1-5.
Kahn, David. “EUROCRYPT 83: A Report.” Cryptologia 7, no. 3 (1983): 254-256.
Kahn, David. The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of Ameri-
can Codebreaking . New Haven: Yale University Press, 2004.
Kaliski, Burton S., Jr. “Emerging Standards for Public-Key Cryptography.” In Lectures
on Data Security: Modern Cryptology in Theory and Practice , ed. Ivan Damgård, 87-104.
Berlin: Springer, 1999.
Kaliski, Burton, and Jessica Staddon. “Public-Key Cryptography Standards (PKCS)
#1: RSA Cryptography Specifications Version 2.0.” RSA Laboratories, 1998.
Kelly, Kevin. Out of Control: The New Biology of Machines, Social Systems, and the
Economic World . Reading, MA: Addison-Wesley, 1994.
Kerckhoffs, Auguste. “La cryptographie militaire.” Journal des Sciences Militaires 9
(1883): 5-38.
Kessler, Jack. “Networked Information in France, 1993: The Internet's Future.” Inter-
net Research 4, no. 1 (1994): 18-30.
Koblitz, Neal, and Alfred J. Menezes. “Another Look at 'Provable Security.'” Journal
of Cryptology 20, no. 1 (2007): 3-37.
Search WWH ::




Custom Search