Cryptography Reference
In-Depth Information
Marty, Gabriel, and Pierre Raynaud. “Théorie générale des preuves.” In Droit civil .
Paris: Sirey, 1972.
Massey, James L. “An Introduction to Contemporary Cryptography.” Proceedings of
the IEEE 76, no. 5 (1988): 533-549.
May, Timothy C. “The Crypto Anarchist Manifesto.” 1992. http://www.activism.net/
cypherpunk/crypto-anarchy.html (accessed June 24, 2011).
Mehrtens, Herbert. “Mathematical Models.” In Models: The Third Dimension of
Science , ed. Soraya De Chadarevian and Nick Hopwood, 276-306. Stanford: Stanford
University Press, 2004.
Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied
Cryptography . Boca Raton, FL: CRC Press, 1997.
Mercuri, Roberta. “A Better Ballot Box?” IEEE Spectrum 39, no. 10 (2002): 46-50.
Merkle, Ralph C. “Secure Communications over Insecure Channels.” Communica-
tions of the ACM 21, no. 4 (1978): 294-299.
Meyer, Elizabeth A. Legitimacy and Law in the Roman World: Tabulae in Roman Belief
and Practice . Cambridge: Cambridge University Press, 2004.
Micali, Silvio. “Fair Public-Key Cryptosystems.” In Advances in Cryptology—CRYPTO
'92 , ed. Ernest F. Brickell, 113-138. London: Springer, 1992.
Micali, Silvio, and Leonid Reyzin. “Physically Observable Cryptography.” In Theory
of Cryptography: Proceedings of Theory of Cryptography, TCC 2004, ed. Moni Naor,
278-296. Berlin: Springer, 2004.
Mitchell, Chris J., Fred Piper, and Peter R. Wild. “Digital Signatures.” In Contemporary
Cryptology: The Science of Information Integrity , ed. Gustavus J. Simmons, 325-378.
Piscataway, NJ: IEEE Press, 1992.
Mitchell, Sandra D. Unsimple Truths: Science, Complexity, and Policy . Chicago: Univer-
sity of Chicago Press, 2009.
Mitchell, William J. The Reconfigured Eye: Visual Truth in the Post-Photographic Era .
Cambridge, MA: MIT Press, 1994.
Monrose, Fabien, and Michael K. Reiter. “Graphical Passwords.” In Security and
Usability: Designing Secure Systems That People Can Use , ed. Lorrie Faith Cranor and
Simson Garfinkel, 157-174. Sebastopol, CA: O'Reilly Media. 2005.
Moran, Tal, and Moni Naor. “Basing Cryptographic Protocols on Tamper-Evident
Seals.” Theoretical Computer Science 411, no. 10 (2010): 1283-1310.
Moran, Tal, and Moni Naor. “Polling with Physical Envelopes: A Rigorous Analysis
of a Human-Centric Protocol.” In Advances in Cryptology—EUROCRYPT 2006 , ed.
Serge Vaudenay, 88-108. Berlin: Springer, 2006.
Search WWH ::




Custom Search