Cryptography Reference
In-Depth Information
Morgan, Mary S. “Models, Stories and the Economic World.”
Journal of Economic
Methodology
8, no. 3 (2001): 361-384.
Morgan, Mary S, and Margaret Morrison, eds.
Models as Mediators: Perspectives on
Natural and Social Sciences
. Cambridge: Cambridge University Press, 1999.
NARA.
Records Management Guidance for PKI Digital Signature Authenticated and Secured
Transaction Records
. Washington, DC: National Archives and Records Administra-
tion, March 11, 2005. http://www.archives.gov/records-mgmt/pdf/pki.pdf (accessed
June 25, 2011).
Naor, Moni, and Benny Pinkas. “Visual Authentication and Identification.” In
Advances in Cryptology—CRYPTO '97
, ed. Burton S. Kaliski, Jr., 322-336. Berlin:
Springer, 1997.
Naor, Moni, and Adi Shamir. “Visual Cryptography.” In
Advances in Cryptology—
EUROCRYPT '94
, ed. Alfredo De Santis, 1-12. Berlin: Springer, 1995.
Neary, Dennis R., Terrence H. Coyle, and Don M. Avedon. “The Integration of
Microilm and the Computer.” In
AFIPS '76: Proceedings of the June 7-10,
1976, National Computer Conference and Exposition
, 627-637. New York: ACM Press,
1976.
Negroponte, Nicholas.
Being Digital
. New York: Vintage Books, 1996.
OECD.
Cryptography Policy: The Guidelines and the Issues
. Paris: OECD, 1997.
Oehler, Michael, Dhananjay Phatak, and John Krautheim. “Visualizing Your Key for
Secure Phone Calls and Language Independence.” In
VizSec '10, Proceedings of the
Seventh International Symposium on Visualization for Cyber Security
, ed. John Gerth,
64-69. New York: ACM Press, 2010.
Otis, Laura.
Networking: Communicating with Bodies and Machines in the Nineteenth
Century
. Ann Arbor: University of Michigan Press, 2001.
Papadimitriou, Christos H.
Computational Complexity
. Reading, MA: Addison-
Wesley, 1994.
Paul, George L.
Foundations of Digital Evidence
. Chicago: American Bar Association,
2008.
Pelkmans, Jacques. “The GSM Standard: Explaining a Success Story.”
Journal of Euro-
pean Public Policy
8, no. 3 (2001): 432-453.
Perrig, Adrian, and Dawn Song. “Hash Visualization: A New Technique to Improve
Real-World Security.” In
International Workshop on Cryptographic Techniques and
E-Commerce (CrypTEC '99)
(1999), 439-458.
Petitcolas, Fabien A. P., Ross J. Anderson, and Markus G. Kuhn. “Information Hiding—
A Survey.”
Proceedings of the IEEE
87, no. 7 (1999): 1062-1078.