-
1
-
-
84961841379
-
System implications of information privacy
-
Washington, D.C.: Thompson
-
H. E. Petersen and R. Turn, “System implications of information privacy,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30. Washington, D.C.: Thompson, 1967, pp. 291-300.
-
(1967)
1967 SJCC, AFIPS Conf. Proc.
, vol.30
, pp. 291-300
-
-
Petersen, H.E.1
Turn, R.2
-
3
-
-
84909649373
-
Fast ‘infinite-key’ privacy transformation - for resource-sharing systems
-
Montvale, N.J.: AFIPS Press
-
J. Carroll and P. McLelland, “Fast ‘infinite-key’ privacy transformation - for resource-sharing systems,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35. Montvale, N.J.: AFIPS Press, 1969, pp. 223-230.
-
(1969)
1969 FJCC, AFIPS Conf. Proc.
, vol.35
, pp. 223-230
-
-
Carroll, J.1
McLelland, P.2
-
4
-
-
0014906436
-
The authorization problem in shared files
-
T. Friedman, “The authorization problem in shared files,” IBM Syst. J., vol. 9, pp. 258-280, 1970.
-
(1970)
IBM Syst. J.
, vol.9
, pp. 258-280
-
-
Friedman, T.1
-
5
-
-
84976815513
-
Security consideration in a multi-programmed computer system
-
Washington, D.C.: Thompson
-
B. Peters, “Security consideration in a multi-programmed computer system,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30. Washington, D.C.: Thompson, 1967, pp. 283-286.
-
(1967)
1967 SJCC, AFIPS Conf. Proc.
, vol.30
, pp. 283-286
-
-
Peters, B.1
-
8
-
-
84911332376
-
-
Brooklyn, N.Y.: Brooklyn College Press. University Microfilms, Ann Arbor, Mich., revised
-
J. M. Wolfe, A First Course in Cryptanalysis. Brooklyn, N.Y.: Brooklyn College Press. (University Microfilms, Ann Arbor, Mich., revised 1943.)
-
(1943)
A First Course in Cryptanalysis
-
-
Wolfe, J.M.1
-
9
-
-
0004265427
-
On distributed communications
-
Aug.
-
P. Baran, “On distributed communications,” Rand Corp. Rep., Aug. 1964, vol. IX.
-
(1964)
Rand Corp. Rep.
, vol.9
-
-
Baran, P.1
-
10
-
-
84938000569
-
A consideration of the application of cryptographic techniques to data processing
-
Montvale, N.J.: AFIPS Press
-
R. Skatrud, “A consideration of the application of cryptographic techniques to data processing,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35. Montvale, N.J.: AFIPS Press, 1969, pp. 111-117.
-
(1969)
1969 FJCC, AFIPS Conf. Proc.
, vol.35
, pp. 111-117
-
-
Skatrud, R.1
-
11
-
-
78349288354
-
Cryptographic coding for data-bank privacy
-
Yorktown Heights, N.Y., Res. Rep. RC 2827
-
H. Feistel, “Cryptographic coding for data-bank privacy,” IBM Corp., Yorktown Heights, N.Y., Res. Rep. RC 2827, 1970.
-
(1970)
IBM Corp.
-
-
Feistel, H.1
-
12
-
-
84941491731
-
Cryptography and computer privacy
-
May
-
—, “Cryptography and computer privacy,” Sci. Amer., May 1973.
-
(1973)
Sci. Amer.
-
-
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vo l. 28, pp. 655-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 655-715
-
-
Shannon, C.1
-
14
-
-
84941509973
-
-
IBM Corp., White Plains, N.Y., SRL Form GA27-3004-2
-
Binary Synchronous Communications, IBM Corp., White Plains, N.Y., SRL Form GA27-3004-2, 1971.
-
(1971)
Binary Synchronous Communications
-
-
-
15
-
-
0014929124
-
A virtual machine time-sharing system
-
R. Meyer and L. Seawright, “A virtual machine time-sharing system,” IBM Syst. J., vol. 9, pp. 199-218, 1970.
-
(1970)
IBM Syst. J.
, vol.9
, pp. 199-218
-
-
Meyer, R.1
Seawright, L.2
|