-
1
-
-
10444238420
-
Postcard from cyberspace
-
February 22
-
D. Akst, "Postcard from cyberspace, " Los Angeles Times, February 22 1995.
-
(1995)
Los Angeles Times
-
-
Akst, D.1
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
2 Feb
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, " Communications of the ACM, v. 24, n. 2, Feb 1981, pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without Identification: Transaction Systems to make Big Brother Obsolete, " Communications of the ACM, 28/10, 1985, pp. 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, " Journal of Cryptology, 1/1, 1988, pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
0003735821
-
Standard for the format of arpa internet messages
-
August
-
D. H. Crocker, "Standard for the format of Arpa Internet messages", RFC 822, August 1982.
-
(1982)
RFC
, vol.822
-
-
Crocker, D.H.1
-
13
-
-
0003292898
-
Requirements for internet hosts-application and support
-
Internet Engineering Task Force October
-
Internet Engineering Task Force, "Requirements for Internet Hosts-Application and Support, " RFC 1123, October 1989.
-
(1989)
RFC
, vol.1123
-
-
-
14
-
-
0003445736
-
On the design and security of of block ciphers
-
Konstanz: Hartung-Gorre Verlag
-
X. Lai, "On the Design and Security of of Block Ciphers, " ETH Series in Information Processing, v. 1, Konstanz: Hartung-Gorre Verlag, 1992.
-
(1992)
ETH Series in Information Processing
, vol.1
-
-
Lai, X.1
-
15
-
-
85011105685
-
A proposal for a new block encryption standard
-
Berlin: Springer-Verlag
-
X. Lai and J. Massey, "A proposal for a New Block Encryption Standard, " Advances in Cryptology-BUROCRYPT '90 Proceedings, Berlin: Springer-Verlag, 1991, pp. 389-404.
-
(1991)
Advances in Cryptology-BUROCRYPT '90 Proceedings
, pp. 389-404
-
-
Lai, X.1
Massey, J.2
-
16
-
-
0003494726
-
Privacy enhancement for internet electronic mail-part i: Message encryption and authentication procedures
-
Feb
-
J. Linn, "Privacy Enhancement for Internet Electronic Mail-Part I: Message Encryption and Authentication Procedures, " RFC 1421, Feb 1993.
-
(1993)
RFC
, vol.1421
-
-
Linn, J.1
-
17
-
-
0003655652
-
-
Microsoft Press
-
S. Maguire, "Writing Solid Code.", Microsoft Press, 1993, pp. 179-180.
-
(1993)
Writing Solid Code
, pp. 179-180
-
-
Maguire, S.1
-
18
-
-
84957876801
-
Crypto anarchy and virtual communities
-
April
-
T. May, "Crypto Anarchy and Virtual communities, " Internet Security Journal, April 1995.
-
(1995)
Internet Security Journal
-
-
May, T.1
-
19
-
-
79951981822
-
Algorithms for synchronizing network clocks
-
September
-
D. L. Mills, "Algorithms for synchronizing network clocks." RFC 956, September 1985.
-
(1985)
RFC
, vol.956
-
-
Mills, D.L.1
-
20
-
-
33645797309
-
Experiments in network clock synchronization
-
September
-
D. L. Mills, "Experiments in network clock synchronization, " RFC 957, September 1985.
-
(1985)
RFC
, vol.957
-
-
Mills, D.L.1
-
21
-
-
0003871309
-
Network time protocol (version 3) specification, implementation and analysis
-
March
-
D. L. Mills, "Network Time Protocol (Version 3) Specification, Implementation and Analysis, " RFC 1305, March 1992.
-
(1992)
RFC
, vol.1305
-
-
Mills, D.L.1
-
23
-
-
0041123608
-
Unmasked on the net
-
March 6
-
J. Quittner, "Unmasked on the Net, " Time magazine, March 6 1995.
-
(1995)
Time Magazine
-
-
Quittner, J.1
-
25
-
-
0011702966
-
Isdn-mixes: Untraceable communication with very small bandwidth overhead
-
Feb. 20-22 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg
-
A. Pfitzmann, B. Pfitzmann and M. Waidner, "ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, " GI/ITG Conference: Communication in Distributed Systems, Mannheim Feb. 20-22 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg 1991, pp. 451-463.
-
(1991)
GI/ITG Conference: Communication in Distributed Systems, Mannheim
, pp. 451-463
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
27
-
-
0008128972
-
Networks without user observability-design options
-
Springer-Verlag, Berlin
-
A. Pfitzmann and M. Waidner, "Networks Without User Observability-design options, " Eurocrypt 85, Springer-Verlag, Berlin 1986, pp. 245-253.
-
(1986)
Eurocrypt
, vol.85
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
28
-
-
0023331864
-
-
Revision in
-
Revision in: Computers & Security, 6/2 1987, pp. 158-166.
-
(1987)
Computers & Security
, vol.6
, Issue.2
, pp. 158-166
-
-
-
29
-
-
0003663927
-
Simple mail transfer protocol
-
August
-
J. B. Postel, "Simple Mail Transfer Protocol", RFC 821, August 1982.
-
(1982)
RFC
, vol.821
-
-
Postel, J.B.1
-
30
-
-
0017930809
-
How to expose an eavesdropper
-
2 Feb
-
R. Rivest and A. Shamir, "How to Expose an Eavesdropper, " Communications of the ACM, v.21, n. 2, Feb 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
-
31
-
-
67649461062
-
-
U.S Patent 4, 405, 829, 20 Sep
-
R. Rivest, A. Shamir, and L. M. Adleman, "Cryptographic Communications System and Method, " U.S Patent 4, 405, 829, 20 Sep 1983.
-
(1983)
Cryptographic Communications System and Method
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.M.3
-
33
-
-
85068030479
-
-
O'Reilly & Associates
-
R. Schwartz, "LearningPerl, " O'Reilly & Associates, 1993
-
(1993)
LearningPerl
-
-
Schwartz, R.1
|