Cryptography Reference
In-Depth Information
Morgan, Mary S. “Models, Stories and the Economic World.” Journal of Economic
Methodology 8, no. 3 (2001): 361-384.
Morgan, Mary S, and Margaret Morrison, eds. Models as Mediators: Perspectives on
Natural and Social Sciences . Cambridge: Cambridge University Press, 1999.
NARA. Records Management Guidance for PKI Digital Signature Authenticated and Secured
Transaction Records . Washington, DC: National Archives and Records Administra-
tion, March 11, 2005. http://www.archives.gov/records-mgmt/pdf/pki.pdf (accessed
June 25, 2011).
Naor, Moni, and Benny Pinkas. “Visual Authentication and Identification.” In
Advances in Cryptology—CRYPTO '97 , ed. Burton S. Kaliski, Jr., 322-336. Berlin:
Springer, 1997.
Naor, Moni, and Adi Shamir. “Visual Cryptography.” In Advances in Cryptology—
EUROCRYPT '94 , ed. Alfredo De Santis, 1-12. Berlin: Springer, 1995.
Neary, Dennis R., Terrence H. Coyle, and Don M. Avedon. “The Integration of
Microilm and the Computer.” In AFIPS '76: Proceedings of the June 7-10,
1976, National Computer Conference and Exposition , 627-637. New York: ACM Press,
1976.
Negroponte, Nicholas. Being Digital . New York: Vintage Books, 1996.
OECD. Cryptography Policy: The Guidelines and the Issues . Paris: OECD, 1997.
Oehler, Michael, Dhananjay Phatak, and John Krautheim. “Visualizing Your Key for
Secure Phone Calls and Language Independence.” In VizSec '10, Proceedings of the
Seventh International Symposium on Visualization for Cyber Security , ed. John Gerth,
64-69. New York: ACM Press, 2010.
Otis, Laura. Networking: Communicating with Bodies and Machines in the Nineteenth
Century . Ann Arbor: University of Michigan Press, 2001.
Papadimitriou, Christos H. Computational Complexity . Reading, MA: Addison-
Wesley, 1994.
Paul, George L. Foundations of Digital Evidence . Chicago: American Bar Association,
2008.
Pelkmans, Jacques. “The GSM Standard: Explaining a Success Story.” Journal of Euro-
pean Public Policy 8, no. 3 (2001): 432-453.
Perrig, Adrian, and Dawn Song. “Hash Visualization: A New Technique to Improve
Real-World Security.” In International Workshop on Cryptographic Techniques and
E-Commerce (CrypTEC '99) (1999), 439-458.
Petitcolas, Fabien A. P., Ross J. Anderson, and Markus G. Kuhn. “Information Hiding—
A Survey.” Proceedings of the IEEE 87, no. 7 (1999): 1062-1078.
Search WWH ::




Custom Search