-
1
-
-
84892331324
-
-
3M (2004) is http://cms.3m.com/cms/US/en/2-68/iclcrFR/view.jhtml.
-
(2004)
-
-
-
2
-
-
84892281279
-
-
absolute (2005) is URL http://www.absolute.com/public/main/.
-
(2005)
-
-
-
3
-
-
84892264841
-
-
ACA (2005) is URL http://www.und.nodak.edu/org/crypto/crypto/.
-
(2005)
-
-
-
4
-
-
84892359957
-
-
Aegean Park Press (2001) is URL http://www.aegeanparkpress.com/.
-
(2001)
-
-
-
5
-
-
84892327858
-
-
AFAC
-
AFAC (2005) is URL http://www-vips.icn.gov.ru/.
-
(2005)
-
-
-
7
-
-
84892211429
-
-
Akamai (2004) is www.akamai.com.
-
(2004)
-
-
-
8
-
-
84892325886
-
-
Amiga (2004) is URL http://www.amiga.org/.
-
(2004)
-
-
-
11
-
-
84892191015
-
-
anonymizer (2005) is URL www.anonymizer.com.
-
(2005)
-
-
-
12
-
-
84892222717
-
-
APWG (2004) is http://www.antiphishing.org/.
-
(2004)
-
-
-
13
-
-
84892256295
-
-
arin (2004) is http://www.arin.net/whois/.
-
(2004)
-
-
-
15
-
-
3543076500
-
Keyboard acoustic emanations
-
Oakland, California, May.
-
Asonov, Dmitri and Rakesh Agrawal (2004) "Keyboard Acoustic Emanations," IEEE Symposium on Security and Privacy, Oakland, California, pp. 3-11, May. Available at http://www.almaden.ibm.com/software/quest/ Publications/papers/ssp04.pdf.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 3-11
-
-
Asonov, D.1
Agrawal, R.2
-
16
-
-
84892234771
-
-
attrition (2004) is URL http://www.attrition.org/.
-
(2004)
-
-
-
17
-
-
84892196843
-
-
attrition-mirror (2005) is URL http://www.attrition.org/mirror/attrition/ .
-
(2005)
-
-
-
18
-
-
84955589604
-
Practical invisibility in digital communication
-
Cambridge, England, May 1996
-
Aura, Tuomas (1996) "Practical Invisibility in Digital Communication," in Proceedings of the Workshop on Information Hiding, Cambridge, England, May 1996, pp. 265-278
-
(1996)
Proceedings of the Workshop on Information Hiding
, pp. 265-278
-
-
Aura, T.1
-
19
-
-
84864840163
-
-
New York, Springer Verlag
-
Lecture Notes in Computer Science 1174, New York, Springer Verlag. Also available from URL http://www.tcs.hut.fi/Personnel/tuomas.html.
-
Lecture Notes in Computer Science
, vol.1174
-
-
-
20
-
-
84892351070
-
-
avenger (2005) is http://www.research.ibm.com/antivirus/SciPapers/Gordon/ Avenger.html.
-
(2005)
-
-
-
21
-
-
84892269787
-
-
badguys (2005) is URL http://www.badguys.org/.
-
(2005)
-
-
-
27
-
-
84892216119
-
-
bbbseal (2005) is URL www.bbbonline.org.
-
(2005)
-
-
-
28
-
-
84892248158
-
-
bbc (2004) is http://www.bbc.co.uk/dna/h2g2/A787917.
-
(2004)
-
-
-
29
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bell, D. E., and L. J. LaPadula (1974) "Secure Computer Systems: Mathematical Foundations and Model," Technical report, MITRE.
-
(1974)
Technical Report, MITRE
-
-
Bell, D.E.1
Lapadula, L.J.2
-
30
-
-
85062838317
-
Safeguarding cryptographic keys
-
Blakley, G. R. (1979) "Safeguarding Cryptographic Keys," in AFIPS Conference Proceedings, 48:313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
31
-
-
84892193252
-
-
Blowfish (2005) is URL http://www.schneier.com/blowfish.html.
-
(2005)
-
-
-
33
-
-
84892348622
-
-
BPCS (2003) is URL http://www.know.comp.kyutech.ac.jp/BPCSe/file BPCSe-principle.html.
-
(2003)
-
-
-
34
-
-
35348847240
-
Organized cybercrime? How cyberspace may affect the structure of criminal relationships
-
Brenner, Susan W. (2002) "Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships," North Carolina Journal of Law and Technology, 4(1).
-
(2002)
North Carolina Journal of Law and Technology
, vol.4
, Issue.1
-
-
Brenner, S.W.1
-
35
-
-
84892288515
-
-
business.com (2004) is http://www.business.com/directory/computers-and- software/security/hardware/tracking-and-theft-prevention/.
-
(2004)
-
-
-
36
-
-
84892267669
-
-
CA (2004) is http://www3.ca.com/securityadvisor/virusinfo/default.aspx.
-
(2004)
-
-
-
38
-
-
84962952893
-
DES is not a group
-
New York, Springer Verlag
-
Campbell, K. W., and M. J. Wiener (1993) "DES Is Not a Group," Advances in Cryptology, CRYPTO '92, New York, Springer Verlag, pp. 512-520.
-
(1993)
Advances in Cryptology, CRYPTO'92
, pp. 512-520
-
-
Campbell, K.W.1
Wiener, M.J.2
-
40
-
-
84892273452
-
-
Baltimore, Johns Hopkins University Press, reissued 1997
-
Translated by Willard R. Trask as The History of My Life, Baltimore, Johns Hopkins University Press, 1967, reissued 1997.
-
(1967)
The History of My Life
-
-
Willard, R.1
-
41
-
-
84892191301
-
-
CDC (2004) is http://www.cdc.gov/.
-
(2004)
-
-
-
42
-
-
84892324194
-
-
CERT (2004) is URL http://www.cert.org/other-sources/viruses.html.
-
(2004)
-
-
-
43
-
-
84892264480
-
-
chatdanger (2005) is URL http://www.safekids.com/chatdanger.htm.
-
(2005)
-
-
-
44
-
-
5244228754
-
Finite state languages
-
May
-
Chomsky, Noam, and George A. Miller (1958) "Finite State Languages," Information and Control, 1(2)91-112, May.
-
(1958)
Information and Control
, vol.1
, Issue.2
, pp. 91-112
-
-
Chomsky, N.1
Miller, G.A.2
-
46
-
-
27544455677
-
A cryptographic checksum for integrity protection
-
December 1
-
Cohen, Fred (1987) "A cryptographic checksum for integrity protection,' Computers and Security, 6(6)505-510, December 1.
-
(1987)
Computers and Security
, vol.6
, Issue.6
, pp. 505-510
-
-
Cohen, F.1
-
49
-
-
84892274127
-
-
comscore (2004) is URL http://www.comscore.com/.
-
(2004)
-
-
-
50
-
-
84892356869
-
-
Conceptlabs (2004) is URL http://www.conceptlabs.co.uk/alicebob.html.
-
(2004)
-
-
-
51
-
-
84892340384
-
-
cookiecentral (2004) is http://www.cookiecentral.com/faq/#2.9.
-
(2004)
-
-
-
52
-
-
84994869893
-
A software-optimized encryption algorithm
-
New York, Springer-Verlag
-
Coppersmith, Donald, and Philip Rogaway (1994) "A Software-Optimized Encryption Algorithm," Fast Software Encryption, Cambridge Security Workshop Proceedings, New York, Springer-Verlag, pp. 56-63.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 56-63
-
-
Coppersmith, D.1
Rogaway, P.2
-
53
-
-
57849101321
-
-
United States Patent 5,454,039, 26 September
-
Coppersmith, Donald, and Philip Rogaway (1995) "Software-Efficient Pseudorandom Function and the Use Thereof for Encryption," United States Patent 5,454,039, 26 September.
-
(1995)
Software-efficient pseudorandom function and the use thereof for encryption
-
-
Coppersmith, D.1
Rogaway, P.2
-
54
-
-
84892242141
-
-
corallosoftware (2005) is http://www.corallosoftware.com/index.html.
-
(2005)
-
-
-
56
-
-
84892331586
-
-
Crap (2005) is URL http://www.mat.dtu.dk/people/Lars.R.Knudsen/crap.html.
-
(2005)
-
-
-
57
-
-
84892224801
-
-
creditexpert (2005) is URL https://www.creditexpert.com/.
-
(2005)
-
-
-
58
-
-
84892213477
-
-
creditreporting (2005) is URL http://affiliates.creditreporting.com/.
-
(2005)
-
-
-
59
-
-
84892321390
-
-
Cryptologia (2005) is URL http://www.dean.usma.edu/math/pubs/cryptologia/ .
-
(2005)
-
-
-
60
-
-
84892281589
-
-
Cryptology (2005) is URL http://link.springer.de/link/service/journals/ 00145/.
-
(2005)
-
-
-
61
-
-
84892361298
-
-
CSE (2005) is URL http://www.cse.dnd.ca/.
-
(2005)
-
-
-
62
-
-
84892356028
-
-
csrc (2004) is http://csrc.nist.gov/CryptoToolkit/tkhash.html.
-
(2004)
-
-
-
63
-
-
84892358916
-
-
CVE (2001) is CVE-2001-0500, Buffer overflow in ISAPI extension, available online at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0500.
-
(2001)
Buffer Overflow in ISAPI Extension
-
-
-
64
-
-
84892324237
-
-
cyberpatrol (2005) is URL http://www.cyberpatrol.com/.
-
(2005)
-
-
-
65
-
-
84892218039
-
-
CyberSitter (2005) is URL http://www.cybersitter.com/.
-
(2005)
-
-
-
66
-
-
84892342510
-
-
cypherpunks (2004) is ftp://ftp.csua.berkeley.edu/pub/cypherpunks/ steganography/.
-
(2004)
-
-
-
67
-
-
0004149207
-
-
2nd Edition, New York, Oxford University Press
-
Dawkins, Richard (1990) The Selfish Gene, 2nd Edition, New York, Oxford University Press.
-
(1990)
The Selfish Gene
-
-
Dawkins, R.1
-
68
-
-
84892295973
-
-
Day
-
Day (2004a) is http://www.csse.uwa.edu.au/~pd/securing-mac-os-x.pdf.
-
(2004)
-
-
-
69
-
-
84892319666
-
-
Day
-
Day (2004b) is http://www.csse.uwa.edu.au/~pd/securing-mac-os-x-present. pdf.
-
(2004)
-
-
-
71
-
-
84892251068
-
-
DES2
-
DES2 (1993) is http://www.itl.nist.gov/fipspubs/fip46-2.htm.
-
(1993)
-
-
-
72
-
-
84892213698
-
-
DES3 (1999) is csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
-
DES3 (1999) is csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
-
-
-
-
73
-
-
84892191538
-
-
digitalenvoy (2004) is www.digitalenvoy.net/.
-
(2004)
-
-
-
74
-
-
84892195436
-
-
dodgeit (2004) is http://www.dodgeit.com/.
-
(2004)
-
-
-
75
-
-
84892259139
-
-
DSD (2005) is URL http://www.dsd.gov.au/.
-
(2005)
-
-
-
76
-
-
84892299462
-
-
dslreports (2004) is URL http://www.dslreports.com/scan.
-
(2004)
-
-
-
77
-
-
84892231942
-
-
Duke (2005) is URL http://www.oit.duke.edu/helpdesk/filesharing/.
-
(2005)
-
-
-
79
-
-
84892222955
-
-
dvdbook (2005) is URL http://www.dvdforum.org/tech-dvdbook.htm.
-
(2005)
-
-
-
80
-
-
84892231471
-
-
eBates (2005) is URL https://www.ebates.com/.
-
(2005)
-
-
-
81
-
-
84892325810
-
-
eeggs (2005) is URL http://www.eeggs.com/.
-
(2005)
-
-
-
82
-
-
84892322780
-
-
EICAR (2004) is URL http://www.eicar.org/.
-
(2004)
-
-
-
83
-
-
84892216904
-
-
Encyc1
-
Encyc1 (2004) is http://www3.ca.com/securityadvisor/virusinfo/browse. aspx.
-
(2004)
-
-
-
84
-
-
84892265063
-
-
Encyc2
-
Encyc2 (2004) is http://securityresponse.symantec.com/avcenter/vinfodb. html.
-
(2004)
-
-
-
85
-
-
84892319533
-
-
ensuretech (2004) is URL http://www.ensuretech.com/.
-
(2004)
-
-
-
86
-
-
84892341801
-
-
equifax (2005) is URL http://www.equifax.com/.
-
(2005)
-
-
-
87
-
-
0024135240
-
Zero knowledge proofs of identity
-
Feige, Uriel, Amos Fiat, and Adi Shamir (1988) "Zero Knowledge Proofs of Identity," Journal of Cryptology, 1(2)77-94.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
88
-
-
0001820140
-
Cryptography and computer privacy
-
May
-
Feistel, Horst (1973) "Cryptography and Computer Privacy," Scientific American, 228(5) 15-23, May.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
89
-
-
84892360761
-
-
FIPS-180 (2005) is http://www.itl.nist.gov/fipspubs/fip180-1.htm.
-
(2005)
-
-
-
90
-
-
84892267190
-
-
FIPS-185 (2005) is http://www.itl.nist.gov/fipspubs/fip185.htm.
-
(2005)
-
-
-
91
-
-
84892248581
-
-
FIPS-186 (2005) is http://www.itl.nist.gov/fipspubs/fip186.htm.
-
(2005)
-
-
-
93
-
-
84892311580
-
-
FreeBSD Words (2005) is URL ftp://www.freebsd.org/usr/share/dict/words.
-
(2005)
-
-
-
94
-
-
84892234917
-
-
freedom (2005) is URL www.freedom.net.
-
(2005)
-
-
-
96
-
-
84892271396
-
-
f-secure (2005) is URL http://www.f-secure.com/.
-
(2005)
-
-
-
97
-
-
84892221130
-
-
ftc (2004) is URL http://www.ftc.gov/opa/2003/09/idtheft.htm.
-
(2004)
-
-
-
98
-
-
84892330759
-
-
FTC-CONT (2005) is URL www.ftc.gov/bcp/conline/pubs/online/sitesee.html.
-
(2005)
-
-
-
99
-
-
84892341903
-
-
FTC-infosecurity (2005) is URL http://www.ftc.gov/bcp/conline/edcams/ infosecurity/index.html.
-
(2005)
-
-
-
100
-
-
84892360970
-
-
FTC-privacy (2005) is http://www.ftc.gov/privacy/index.html.
-
(2005)
-
-
-
101
-
-
84892197073
-
-
FTC-work (2005) is http://www.ftc.gov/bcp/workshops/spyware/index.htm.
-
(2005)
-
-
-
102
-
-
84892231827
-
-
fundrace (2005) is URL http://fundrace.org/citymap.php.
-
(2005)
-
-
-
105
-
-
84892318873
-
-
GCHQ (2003) is URL http://www.gchq.gov.uk/.
-
(2003)
-
-
-
106
-
-
84892230996
-
-
gemplus (2005) is URL http://www.gemplus.com/.
-
(2005)
-
-
-
107
-
-
84892216625
-
-
Bantam Spectra (Random House), Updated edition
-
Gerrold, David (1988) When HARLIE Was One, Bantam Spectra (Random House), Updated edition.
-
(1988)
When HARLIE Was One
-
-
Gerrold, D.1
-
108
-
-
84892344388
-
-
getnetwise (2005) is URL www.getnetwise.org/.
-
(2005)
-
-
-
109
-
-
84892279296
-
-
getnetwise-ctrct (2005) is URL www.getnetwise.org/tools/toolscontracts. php.
-
(2005)
-
-
-
110
-
-
84892314125
-
-
GnuPG (2004) is http://www.gnupg.org/.
-
(2004)
-
-
-
111
-
-
0004201481
-
-
2nd edition, Laguna Hills, Calif., Aegean Park Press
-
Golomb, Solomon W. (1982) Shift Register Sequences, 2nd edition, Laguna Hills, Calif., Aegean Park Press.
-
(1982)
Shift Register Sequences
-
-
Golomb, S.W.1
-
112
-
-
84892317432
-
-
Google (2005) is URL desktop.google.com
-
Google (2005) is URL desktop.google.com.
-
-
-
-
114
-
-
0021510842
-
UNIX operating system security
-
October
-
Grampp, F. T., and R. H. Morris (1984) "UNIX Operating System Security," Bell Laboratories Technical Journal, 63(8)1649-1672, October.
-
(1984)
Bell Laboratories Technical Journal
, vol.63
, Issue.8
, pp. 1649-1672
-
-
Grampp, F.T.1
Morris, R.H.2
-
115
-
-
84892293215
-
-
gregorybraun (2005) is URL http://www.gregorybraun.com/PassKeep.html.
-
(2005)
-
-
-
116
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
-
Berlin, Springer-Verlag
-
Guillou, Louis, and Jean-Jacques Quisquater (1988) "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory," in Advances in Cryptology, Eurocrypt '88 Proceedings, pp. 123-128, Berlin, Springer-Verlag.
-
(1988)
Advances in Cryptology, Eurocrypt '88 Proceedings
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.-J.2
-
117
-
-
84892270247
-
-
Guinness (2004) is www.guinnessworldrecords.com/.
-
(2004)
-
-
-
118
-
-
84892210169
-
-
Gutenberg (2005) is URL http://www.gutenberg.net/.
-
(2005)
-
-
-
120
-
-
15944406369
-
-
Berkeley, CA, Osborne/McGraw-Hill
-
Harley, David, Robert Slade, and Urs Gattiker (2001) Viruses Revealed, Berkeley, CA, Osborne/McGraw-Hill.
-
(2001)
Viruses Revealed
-
-
Harley, D.1
Slade, R.2
Gattiker, U.3
-
123
-
-
84892347273
-
-
homograph (2005) is the PDF document at http://www.cs.technion.ac.il/ ~gabr/papers/homograph-full.pdf.
-
(2005)
-
-
-
124
-
-
84892303952
-
-
honker (2004) is URL http://www.cnhonker.com/.
-
(2004)
-
-
-
125
-
-
84892248210
-
Spyware: What you don't know can hurt you
-
April 29, 2004, serial no. 108-89
-
House (2004) "Spyware: what you don't know can hurt you." Hearing before the subcommittee on commerce, trade, and consumer protection, April 29, 2004, serial no. 108-89. Available at http://www.access.gpo.gov/ congress/house/house05ch108.html.
-
(2004)
Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection
-
-
-
126
-
-
84892258720
-
-
Hydan (2005) is URL http://www.crazyboy.com/hydan/.
-
(2005)
-
-
-
127
-
-
84892220409
-
-
IANA port (2004) is URL http://www.iana.org/assignments/port-numbers.
-
(2004)
-
-
-
128
-
-
84892263476
-
-
IbmAntiVirus (2005) http://www.research.ibm.com/antivirus/.
-
(2005)
-
-
-
129
-
-
84892190698
-
-
idtheftcenter (2004) is http://www.idtheftcenter.org/index.shtml.
-
(2004)
-
-
-
130
-
-
84892290721
-
-
IIS (2004) is www.microsoft.com/iis.
-
(2004)
-
-
-
131
-
-
84892289887
-
-
Information Week (2004) is URL http://www.informationweek.com/story/ showArticle.jhtml?articleID=52601698.
-
(2004)
-
-
-
132
-
-
84892353228
-
-
insecure (2004) is URL http://www.insecure.org/nmap/.
-
(2004)
-
-
-
133
-
-
84892331476
-
-
intelius (2005) is URL http://find.intelius.com/.
-
(2005)
-
-
-
134
-
-
84892363852
-
-
IOCCC (2004) is http://www.ioccc.org/.
-
(2004)
-
-
-
135
-
-
84892330297
-
-
iridiantech (2005) is URL http://www.iridiantech.com/.
-
(2005)
-
-
-
136
-
-
84892296498
-
-
ISIS (2005) http://www.imrg.org/8025696F004581B3/pages/imrg+Resources.
-
(2005)
-
-
-
137
-
-
84892267455
-
-
ISS (2005) is URL www.iss.net.
-
(2005)
-
-
-
138
-
-
84892343471
-
-
ITU (2005) is URL http://www.itu.int/home/index.html.
-
(2005)
-
-
-
139
-
-
84892244343
-
-
Jack Moratis (2004) is http://home.comcast.net/~educbc5454/software.html.
-
(2004)
-
-
Moratis, J.1
-
140
-
-
84892212066
-
-
Jargon (2004) is URL http://www.catb.org/~esr/jargon/.
-
(2004)
-
-
-
141
-
-
0003482562
-
-
Boston, Kluwer Academic
-
Johnson, Neil F., et al. (2001) Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Advances in Information Security, volume 1, Boston, Kluwer Academic.
-
(2001)
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Advances in Information Security
, vol.1
-
-
Johnson, N.F.1
-
142
-
-
84892279004
-
-
junkbusters declare (2005) is URL http://www.junkbusters.com/declare. html.
-
(2005)
-
-
-
145
-
-
0003185688
-
La cryptographie militaire
-
January-February
-
Kerckhoffs, Auguste (1883) "La Cryptographie Militaire," Journal des Sciences Militaires, 9:5-38, 161-191, January-February. Also available in html format from URL http://www.petitcolas.net/fabien/kerckhoffs/ la-cryptographie-militaire-i.htm.
-
(1883)
Journal des Sciences Militaires
, vol.9
, Issue.5-38
, pp. 161-191
-
-
Kerckhoffs, A.1
-
146
-
-
84892345331
-
-
Knowspam (2004) is URL http://www.Knowspam.net/.
-
(2004)
-
-
-
147
-
-
84892322318
-
-
knowyourloanrate (2005) is URL https://www.knowyourloanrate.com/.
-
(2005)
-
-
-
148
-
-
0003579172
-
-
Reading, Mass., Addison-Wesley
-
Knuth, Donald E. (1984) The TEXBook, Reading, Mass., Addison-Wesley.
-
(1984)
The TEXBook
-
-
Knuth, D.E.1
-
150
-
-
84892280911
-
-
Kuhn (2004) is URL http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577. pdf.
-
(2004)
-
-
Kuhn1
-
151
-
-
0021469033
-
Implementation of a method guaranteeing retrieval in one access
-
July
-
Larson, P. Å., and A. Kajla (1984) "Implementation of a Method Guaranteeing Retrieval in One Access," Communications of the ACM, 27(7)670-677, July.
-
(1984)
Communications of the ACM
, vol.27
, Issue.7
, pp. 670-677
-
-
Larson, P.A.1
Kajla, A.2
-
152
-
-
84892329618
-
-
http://www.lavasoftusa.com/
-
Lavasoft (2004) is http://www.lavasoftusa.com/ or http://www.lavasoft.de/ .
-
(2004)
-
-
-
154
-
-
84892263370
-
-
Mailblocks (2004) is URL http://www.Mailblocks.com.
-
(2004)
-
-
-
155
-
-
84892328306
-
-
MailFrontier (2004) is URL http://www.MailFrontier.com/.
-
(2004)
-
-
-
156
-
-
84892342801
-
-
mailinator (2004) is URL http://www.mailinator.net/mailinator/Welcome.do.
-
(2004)
-
-
-
158
-
-
84892212158
-
-
maporama (2004) is http://www.maporama.com/share/.
-
(2004)
-
-
-
159
-
-
84892290513
-
-
mapquest (2004) is http://www.mapquest.com/maps/latlong.adp.
-
(2004)
-
-
-
160
-
-
84892279957
-
-
MathWorld (2005) is html file Gram-SchmidtOrthonormalization.html in URL http://mathworld.wolfram.com/.
-
(2005)
-
-
-
161
-
-
84892295403
-
-
McAfee (2004) is URL http://www.mcafee.com/us/.
-
(2004)
-
-
-
162
-
-
84947944750
-
StegFS: A steganographic file system for linux
-
New York, Springer-Verlag, LNCS
-
McDonald, Andrew D., and Markus G. Kuhn (1999) "StegFS: A Steganographic File System for Linux," in Proceedings of Information Hiding, New York, Springer-Verlag, LNCS 1768, pp. 463-477. Also available from http://www.mcdonald.org.uk/StegFS/.
-
(1999)
Proceedings of Information Hiding
, vol.1768
, pp. 463-477
-
-
McDonald, A.D.1
Kuhn, M.G.2
-
163
-
-
84892193313
-
-
MD5 (2004) is ftp://ftp.umbc.edu/pub/unix/rfc/rfc1321.txt.gz.
-
(2004)
-
-
-
164
-
-
84892317988
-
-
melissavirus (2005) is URL www.melissavirus.com/.
-
(2005)
-
-
-
165
-
-
0019587141
-
On the security of multiple encryption
-
Merkle, R. C., and M. Hellman (1981) "On the Security of Multiple Encryption," Communications of the ACM, 24(7)465-467.
-
(1981)
Communications of the ACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.C.1
Hellman, M.2
-
166
-
-
84892328355
-
-
missingkids (2005) is URL http://www.missingkids.com/.
-
(2005)
-
-
-
168
-
-
66849133747
-
-
Indianapolis, IN, Bobbs-Merrill, 1962; London, Harrap
-
Moore, Dan Tyler and MarthaWaller (1965) Cloak and Cipher, Indianapolis, IN, Bobbs-Merrill, 1962; London, Harrap.
-
(1965)
Cloak and Cipher
-
-
Moore, D.T.1
Waller, M.2
-
169
-
-
84892275739
-
-
MS04-028 (2004) is http://www.microsoft.com/technet/security/bulletin/ MS04-028.mspx.
-
(2004)
-
-
-
170
-
-
84892256243
-
-
MSoffice (2005) is URL http://office.microsoft.com/en-us/officeupdate/.
-
(2005)
-
-
-
171
-
-
84892193332
-
-
MSsecurity (2005) is URL http://www.microsoft.com/security/.
-
(2005)
-
-
-
172
-
-
84892228660
-
-
MStechnet (2005) is URL http://www.microsoft.com/technet/security/.
-
(2005)
-
-
-
173
-
-
84892235923
-
-
MTX (2005) is URL http://www.f-secure.com/v-descs/mtx.shtml.
-
(2005)
-
-
-
174
-
-
84892275389
-
-
NCM
-
NCM (2005) is URL http://www.nsa.gov/museum/.
-
(2005)
-
-
-
175
-
-
84892215294
-
-
netnanny (2005) is URL http://www.netnanny.com/.
-
(2005)
-
-
-
176
-
-
84892351071
-
-
Network solutions (2004) is URL http://www.networksolutions.com/en-US/ whois/index.jhtml.
-
(2004)
-
-
-
177
-
-
84892208745
-
-
networkusa (2005) is URL http://www.networkusa.org/fingerprint.shtml.
-
(2005)
-
-
-
179
-
-
84892200786
-
-
Nicetext (2005) is URL http://www.nicetext.com/.
-
(2005)
-
-
-
180
-
-
0003193443
-
The digital signature standard, proposal and discussion
-
NIST
-
NIST (1992) "The Digital Signature Standard, proposal and discussion," Communications of the ACM, 35(7):36-54.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 36-54
-
-
-
181
-
-
84892345747
-
-
NIST (2004) is URL http://csrc.nist.gov/virus/.
-
(2004)
-
-
-
182
-
-
84892302478
-
-
available at csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf
-
NIST Handbook (2004) is available at csrc.nist.gov/publications/nistpubs/ 800-12/handbook.pdf.
-
(2004)
NIST Handbook
-
-
-
183
-
-
84892261266
-
-
NISTunits (2004) is http://physics.nist.gov/cuu/Units/binary.html.
-
(2004)
-
-
-
184
-
-
84892232758
-
-
NSA (2004) is http://www.nsa.gov/.
-
(2004)
-
-
-
185
-
-
84892271203
-
-
NSA-SEC (2005) is URL http://www.nsa.gov/snac/.
-
(2005)
-
-
-
186
-
-
84892205282
-
-
NSA-venona (2004) is http://www.nsa.gov/venona/.
-
(2004)
-
-
-
187
-
-
84892212841
-
-
onion-router (2005) is URL http://www.onion-router.net/.
-
(2005)
-
-
-
188
-
-
84892341203
-
-
OpenPGP (2005) is http://www.openpgp.org/.
-
(2005)
-
-
-
189
-
-
84892304176
-
-
opensecrets (2005) is URL http://www.opensecrets.org/indivs/.
-
(2005)
-
-
-
190
-
-
77649322936
-
-
OpenSSL (2004) is the OpenSSL project, located at http://www.openssl.org.
-
(2004)
OpenSSL Project
-
-
-
192
-
-
84892314291
-
-
packet-sniffing (2004) is URL http://www.packet-sniffing.com/.
-
(2004)
-
-
-
193
-
-
84892305811
-
-
pchell (2005) is URL http://www.pchell.com/virus/mtx.shtml.
-
(2005)
-
-
-
194
-
-
84892217077
-
-
PCPhoneHome (2004) is http://www.pcphonehome.com/.
-
(2004)
-
-
-
195
-
-
84892236455
-
-
performics (2005) is http://www.performics.com/about/press/code-of- conduct.pdf.
-
(2005)
-
-
-
196
-
-
84892339684
-
-
Petitcolas (2003) is URL http://www.petitcolas.net/fabien/steganography/ bibliography/.
-
(2003)
-
-
-
197
-
-
0001187269
-
Information hiding terminology
-
New York, Springer
-
Pfitzmann, B. (1996) "Information Hiding Terminology," in Information Hiding, New York, Springer
-
(1996)
Information Hiding
-
-
Pfitzmann, B.1
-
199
-
-
84892227316
-
-
ping (2004) is URL http://ftp.arl.mil/~mike/ping.html.
-
(2004)
-
-
-
200
-
-
84892349722
-
-
PKCS
-
PKCS (2004) is http://www.rsasecurity.com/rsalabs/node.asp?id=2124.
-
(2004)
-
-
-
201
-
-
0004287521
-
-
2nd edition, Middleton, Wisconsin, A-R Editions
-
Pohlmann, Ken (1992) The Compact Disc Handbook, 2nd edition, Middleton, Wisconsin, A-R Editions.
-
(1992)
The Compact Disc Handbook
-
-
Pohlmann, K.1
-
202
-
-
84892252669
-
-
privacyalliance (2005) is URL http://www.privacyalliance.org/.
-
(2005)
-
-
-
203
-
-
84892222374
-
-
privacyrights (2005) is URL http://www.privacyrights.org/fs/fs21- children.htm.
-
(2005)
-
-
-
204
-
-
84892241570
-
-
protectkids (2005) is URL http://www.protectkids.com/.
-
(2005)
-
-
-
205
-
-
84892250326
-
-
purityscan (2005) is URL http://www.purityscan.com/.
-
(2005)
-
-
-
206
-
-
84892307449
-
-
qspace (2005) is URL http://qspace.iplace.com/.
-
(2005)
-
-
-
207
-
-
84892312984
-
-
Quova (2004) is www.quova.com/.
-
(2004)
-
-
-
208
-
-
84892219021
-
-
Raymond (2004) is URL http://www.catb.org/~esr/faqs/.
-
(2004)
-
-
-
210
-
-
84892263102
-
-
remotelyanywhere (2004) is URL http://www.remotelyanywhere.com/.
-
(2004)
-
-
-
212
-
-
84892199975
-
-
RFC-862 (2004) is at URL www.faqs.org/rfcs/rfc862.html.
-
(2004)
-
-
-
213
-
-
84892319329
-
-
RFC-864 (2004) is at URL www.faqs.org/rfcs/rfc864.html.
-
(2004)
-
-
-
214
-
-
84892275195
-
-
rfc1321 (2005) is URL http://www.ietf.org/rfc/rfc1321.txt.
-
(2005)
-
-
-
215
-
-
84892192655
-
-
RFC-1738 (2004) is at URL www.faqs.org/rfcs/rfc1738.html.
-
(2004)
-
-
-
216
-
-
84892261602
-
-
RIAA (2005) is URL http://www.riaa.com/about/members/.
-
(2005)
-
-
-
217
-
-
84892343180
-
-
Ritter (2005) is URL http://www.ciphersbyritter.com/ARTS/PRACTLAT.HTM.
-
(2005)
-
-
-
218
-
-
0242528365
-
Substitution cipher with pseudo-random shuffling: The dynamic substitution combiner
-
Ritter, Terry (1990) "Substitution Cipher with Pseudo-Random Shuffling: The Dynamic Substitution Combiner," Cryptologia 14(4)289-303. An updated version is available at http://www.ciphersbyritter.com/DYNSUB.HTM.
-
(1990)
Cryptologia
, vol.14
, Issue.4
, pp. 289-303
-
-
Ritter, T.1
-
219
-
-
78650922644
-
The MD4 message digest algorithm
-
Menezes, A. J., and S. A. Vanstone, (eds.), New York, Springer-Verlag
-
Rivest, R. (1991) "The MD4 Message Digest Algorithm," in Menezes, A. J., and S. A. Vanstone, (eds.), Advances in Cryptology: CRYPTO '90 Proceedings, pp. 303-311, New York, Springer-Verlag.
-
(1991)
Advances in Cryptology: CRYPTO '90 Proceedings
, pp. 303-311
-
-
Rivest, R.1
-
220
-
-
0003602325
-
-
RFC 1320, MIT and RSA Data Security, Inc., April
-
Rivest, R. (1992) "The MD4 Message Digest Algorithm," RFC 1320, MIT and RSA Data Security, Inc., April.
-
(1992)
The MD4 Message Digest Algorithm
-
-
Rivest, R.1
-
221
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
June
-
Rochlis, J., and M. Eichin (1989) "With Microscope and Tweezers: The Worm from MIT's Perspective," Communications of the ACM, 32(6):689-698, June.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
Rochlis, J.1
Eichin, M.2
-
222
-
-
84892282856
-
-
Sebastopol, CA, O'Reilly Assoc
-
Roman, Steven (1999) Writing Word Macros, Sebastopol, CA, O'Reilly Assoc.
-
(1999)
Writing Word Macros
-
-
Roman, S.1
-
223
-
-
84892196781
-
-
Rosenberger (2005) is URL http://www.vmyths.com/fas/fas1.cfm.
-
(2005)
-
-
Rosenberger1
-
224
-
-
84892325485
-
-
RSA (2001) is URL http://www.rsasecurity.com/rsalabs/challenges/ factoring/file faq.html.
-
(2001)
-
-
-
225
-
-
84892265025
-
-
RSA-MD4 (2005) is http://www.rsasecurity.com/rsalabs/node.asp?id=2253.
-
(2005)
-
-
-
226
-
-
84892329307
-
-
RSASecurID (2004) is http://www.rsasecurity.com/node.asp?id=1157.
-
(2004)
-
-
-
227
-
-
84892214982
-
-
RSAsecurity (2004) is URL http://www.rsasecurity.com/.
-
(2004)
-
-
-
228
-
-
84892273183
-
-
safekids (2005) is URL http://www.safekids.com/.
-
(2005)
-
-
-
229
-
-
84892312187
-
-
SaftLite (2005) is available at http://haoli.dnsalias.com/shared/saft- lite.hqx.
-
(2005)
-
-
-
233
-
-
84892255704
-
-
Savard (2005) is URL http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.htm.
-
(2005)
-
-
Savard1
-
234
-
-
84892340610
-
-
scc-inc (2004) is http://www.scc-inc.com/SccVsLexmark/.
-
(2004)
-
-
-
235
-
-
0001254670
-
Fast software encryption
-
New York, Springer-Verlag. Also available from
-
Schneier, Bruce (1993) "Fast Software Encryption," in Cambridge Security Workshop Proceedings, pp. 191-204. New York, Springer-Verlag. Also available from http://www.counterpane.com/bfsverlag.html.
-
(1993)
Cambridge Security Workshop Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
236
-
-
0003851399
-
-
2nd edition, New York, John Wiley
-
Schneier, Bruce (1995) Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, New York, John Wiley.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
237
-
-
84892234837
-
-
Schneier, Bruce (2003) is URL http://www.counterpane.com/crypto-gram. html.
-
(2003)
-
-
Schneier, B.1
-
239
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, Claus Peter (1991) "Efficient Signature Generation for Smart Cards," Journal of Cryptology, 4(3)161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
240
-
-
0012486876
-
-
Jobus Hertz, printer
-
Schotti, Gaspari (1665) Schola Steganographica, Jobus Hertz, printer. Some page photos from this old book are available at URL http://www.cl.cam.ac. uk/~fapp2/steganography/steganographica/index.html.
-
(1665)
Schola Steganographica
-
-
Schotti, G.1
-
241
-
-
84892294747
-
-
SearchAndDestroy (2004) is URL http://www.SearchAndDestroy.com/.
-
(2004)
-
-
-
242
-
-
84892294837
-
-
secunia (2004) is http://secunia.com/.
-
(2004)
-
-
-
243
-
-
84892281842
-
-
send-safe (2005) is URL http://www.send-safe.com.
-
(2005)
-
-
-
244
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, Adi (1979) "How to Share a Secret," Communications of the ACM, 22(11)612-613, November.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
246
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
Shannon, Claude E. (1949) "Communication Theory of Secrecy Systems," Bell System Technical Journal, 28:656-715, October.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
247
-
-
84944486544
-
Prediction and entropy of printed english
-
January
-
Shannon, Claude E. (1951) "Prediction and Entropy of Printed English," Bell System Technical Journal, 30:50-64, January.
-
(1951)
Bell System Technical Journal
, vol.30
, pp. 50-64
-
-
Shannon, C.E.1
-
248
-
-
84976720856
-
The worm programs-early experience with a distributed computation
-
Reprinted in [Denning 90]
-
Shoch, John and Jon Hupp (1982) "The Worm Programs-Early Experience With a Distributed Computation," Communications of the ACM, 25(3)172-180. Reprinted in [Denning 90].
-
(1982)
Communications of the ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
Shoch, J.1
Hupp, J.2
-
249
-
-
77953864168
-
-
Laguna Hills, Calif., Aegean Park Press
-
Simovits, Mikael J. (1996) The DES, an Extensive Documentation and Evaluation, Laguna Hills, Calif., Aegean Park Press, vol. C-68.
-
(1996)
The DES, An Extensive Documentation and Evaluation
, vol.C-68
-
-
Simovits, M.J.1
-
250
-
-
0004034591
-
-
New York, Doubleday
-
Singh, Simon (1999) The Code Book, New York, Doubleday.
-
(1999)
The Code Book
-
-
Singh, S.1
-
251
-
-
0003967331
-
-
(New Mathematical Library, No. 22), Washington, D.C., Mathematical Assn. of America
-
Sinkov, A. (1980) Elementary Cryptanalysis: A Mathematical Approach (New Mathematical Library, No. 22), Washington, D.C., Mathematical Assn. of America.
-
(1980)
Elementary Cryptanalysis: A Mathematical Approach
-
-
Sinkov, A.1
-
252
-
-
84892210411
-
-
smartcardalliance (2005) is http://www.smartcardalliance.org/industry- info/index.cfm.
-
(2005)
-
-
-
253
-
-
84892309499
-
-
Skoudis (2005) is http://infosecuritymag.com/skoudis
-
(2005)
-
-
-
254
-
-
84892350546
-
-
snapfiles (2004) is URL http://www.snapfiles.com/.
-
(2004)
-
-
-
255
-
-
84892332578
-
-
sophos (2005) is URL www.sophos.com/virusinfo/hoaxes.
-
(2005)
-
-
-
256
-
-
84950911208
-
Lucifer, A cryptographic algorithm
-
January. An addendum is in 8(3)260-261
-
Sorkin, Arthur (1984) "Lucifer, A Cryptographic Algorithm," Cryptologia, 8(1):22-41, January. An addendum is in 8(3)260-261.
-
(1984)
Cryptologia
, vol.8
, Issue.1
, pp. 22-41
-
-
Sorkin, A.1
-
257
-
-
84892319513
-
-
spam (2004) is URL http://media.hormel.com/templates/knowledge/knowledge. asp?catitemid=14&id=94.
-
(2004)
-
-
-
258
-
-
84892333037
-
-
spam abuse (2004) is URL http://spam.abuse.net/others/sites.shtml.
-
(2004)
-
-
-
259
-
-
84892353574
-
-
SpamArrest (2004) is URL http://www.SpamArrest.com.
-
(2004)
-
-
-
260
-
-
84892340842
-
-
spambob (2004) is http://spambob.com/.
-
(2004)
-
-
-
261
-
-
84892259256
-
-
spamcop (2005) is URL http://www.spamcop.com/.
-
(2005)
-
-
-
262
-
-
84892349371
-
-
spamgourmet (2004) is http://www.spamgourmet.com/.
-
(2004)
-
-
-
263
-
-
84892302811
-
-
Spamhaus (2005) is URL http://www.spamhaus.org/.
-
(2005)
-
-
-
264
-
-
84892263419
-
-
spamhauslasso (2005) is http://www.spamhaus.org/statistics.lasso.
-
(2005)
-
-
-
265
-
-
84892349306
-
-
SpectorSoft (2004) is http://www.SpectorSoft.com/.
-
(2004)
-
-
-
266
-
-
84892261256
-
-
Spybot (2004) is http://www.spybot.info/en/index.html.
-
(2004)
-
-
-
267
-
-
84892258442
-
-
Spy Sweeper (2005) is URL http://www.webroot.com/.
-
(2005)
-
-
-
268
-
-
84892220954
-
-
spywareguide (2004) is URL http://www.spywareguide.com/.
-
(2004)
-
-
-
269
-
-
84892345535
-
-
spywareguide-country (2004) is URL http://www.spywareguide.com/articles/ country-code-extensions-look-u-45.html.
-
(2004)
-
-
-
270
-
-
84892193691
-
-
spywareinfo (2004) is URL http://www.spywareinfo.com/.
-
(2004)
-
-
-
271
-
-
84892246175
-
-
ssa-gov (2004) is URL https://s044a90.ssa.gov/apps6/isss/bp-7004home.jsp.
-
(2004)
-
-
-
272
-
-
84892235214
-
-
ssa-form (2004) is http://www.ssa.gov/online/ssa-7004.pdf.
-
(2004)
-
-
-
273
-
-
84892304497
-
-
ssa-stat (2005) is URL https://s044a90.ssa.gov/apps6a/isss/main.html.
-
(2005)
-
-
-
276
-
-
84892339871
-
-
Steganosaurus (2004) is URL http://www.fourmilab.to/stego/.
-
(2004)
-
-
-
277
-
-
84892222023
-
-
Stego (2005) is URL http://www.stego.com/.
-
(2005)
-
-
-
278
-
-
0024011325
-
Stalking the wily hacker
-
May
-
Stoll, Clifford (1988) "Stalking the Wily Hacker," Communications of the ACM, 31(5) 484-497, May.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
280
-
-
84892318061
-
-
Stoll, Clifford (2004) http://www.ocf.berkeley.edu/~stoll/.
-
(2004)
-
-
Stoll, C.1
-
281
-
-
84892236260
-
-
storagereview (2000) is URL http://www.storagereview.com/guide2000/ref/ hdd/index.html.
-
(2000)
-
-
-
282
-
-
0004238923
-
-
Ithaca, NY, W. P. Humphrey, (also NY, Bartleby.com 1999)
-
Strunk, William Jr. (1918) The Elements of Style, Ithaca, NY, W. P. Humphrey, (also NY, Bartleby.com 1999).
-
(1918)
The Elements of Style
-
-
Strunk Jr., W.1
-
283
-
-
84892355388
-
-
sweetcocoa (2005) is URL http://homepage.mac.com/sweetcocoa/lapcop/.
-
(2005)
-
-
-
284
-
-
84892351866
-
-
Symantec (2004) is URL http://www.symantec.com/index.htm.
-
(2004)
-
-
-
285
-
-
84892348819
-
-
takedown (2004) is URL http://www.takedown.com/.
-
(2004)
-
-
-
286
-
-
84892224428
-
-
technet (2004) is http://www.microsoft.com/technet/archive/community/ columns/security/essays/10imlaws.mspx.
-
(2004)
-
-
-
287
-
-
84892201744
-
-
theinquirer (2004) is UTL http://www.theinquirer.net/?article=19159.
-
(2004)
-
-
-
289
-
-
84976781807
-
Reflections on trusting trust
-
Thompson, Ken (1984) "Reflections on Trusting Trust," Communications Of The ACM, 27(8)172-180.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 172-180
-
-
Thompson, K.1
-
290
-
-
84892248795
-
-
TransUnion (2005) is URL https://www.freecreditprofile.com/.
-
(2005)
TransUnion
-
-
-
291
-
-
84892222562
-
-
Trithemius, Johannes (1606) Steganographia. Available (for private use only) from URL http://www.esotericarchives.com/tritheim/stegano.htm.
-
(1606)
-
-
Trithemius, J.1
-
292
-
-
84892327826
-
-
truste (2005) is URL http://www.truste.org/.
-
(2005)
-
-
-
293
-
-
84892207412
-
-
Unicode (2005) is URL http://www.unicode.org.
-
(2005)
-
-
-
294
-
-
84884544425
-
-
Unicode Standard, Version 2.0, Reading, Mass., Addison-Wesley
-
Unicode Standard (1996) The Unicode Standard, Version 2.0, Reading, Mass., Addison-Wesley.
-
(1996)
The Unicode Standard
-
-
-
295
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk
-
van Eck, Wim (1985) "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk," Computers and Security, 4:269-286.
-
(1985)
Computers and Security
, vol.4
, pp. 269-286
-
-
Van Eck, W.1
-
296
-
-
84892331837
-
-
Verisign (2004) is http://www.verisign.com/products-services/security- services/pki/unified-authentication/.
-
(2004)
-
-
-
297
-
-
84892278334
-
-
versiontracker (2005) is URL http://www.versiontracker.org/.
-
(2005)
-
-
-
299
-
-
84892269785
-
-
vmyths (2005) is URL http://www.vmyths.com/.
-
(2005)
-
-
-
300
-
-
84892192948
-
-
vote-smart (2005) is http://www.vote-smart.org/pdf/vsdm2004/vsdm-2004. pdf.
-
(2005)
-
-
-
301
-
-
84892228679
-
-
WatermarkingWorld (2005) is located at URL http://www.watermarkingworld. org/.
-
(2005)
-
-
-
302
-
-
84950895792
-
Mimic functions
-
July
-
Wayner, Peter (1992) "Mimic Functions," Cryptologia, XVI(3)193-214, July.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
304
-
-
84892337627
-
-
Webopedia (2004) is URL http://www.webopedia.com/.
-
(2004)
-
-
-
305
-
-
84892303448
-
-
webroot (2004) is URL http://www.webroot.com/.
-
(2004)
-
-
-
306
-
-
84892341956
-
-
Western digital (2004) is URL http://www.wdc.com/en/products/Products. asp?DriveID=35.
-
(2004)
-
-
-
307
-
-
84892211092
-
-
Wild List (2004) is URL http://www.wildlist.org/.
-
(2004)
-
-
-
308
-
-
4043128777
-
Computer (In)security: Infiltrating open systems
-
and in [Denning 90]
-
Witten, Ian H. (1987) "Computer (In)security: Infiltrating Open Systems," ABACUS, 4(4)7-25. Also available from http://cryptome.org/ compinsec.htm and in [Denning 90].
-
(1987)
ABACUS
, vol.4
, Issue.4
, pp. 7-25
-
-
Witten, I.H.1
-
313
-
-
84892256062
-
-
Zimmermann, Philip (2001) is http://www.philzimmermann.com/.
-
(2001)
-
-
Zimmermann, P.1
|