Annotated Bibliography

If you can’t annoy somebody, there is little point in writing.

—Kingsley Amis

[1] 3GPP home page, at www.3gpp.org/ Cited on page 381

[2] @stake LC 5, at en.wikipedia.org/wiki/@stake Cited on page 241

  • Prior to being acquired by Symantec, @stake was a leading security company. At one time they made news for supposedly firing a top-notch security expert for his implicit criticism of Microsoft (see, for example, dc.internet.com/news/article.php/3083901).

[3] M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, Vol. 22, No.1, pp. 6–15, January 1996. Cited on page 314

[4] E. Aboufadel, Work by the Poles to break the Enigma codes, at faculty.gvsu.edu/aboufade/web/enigma/polish.htm Cited on page 176

  • A brief description of the brilliant work by the Polish cryptanalysts.

[5] Access control matrix, at en.wikipedia.org/wiki/Access_Control_Matrix Cited on page 271

[6] E. Ackerman, Student skirts CD’s piracy guard, SiliconValley.com, at technews.acm.org/articles/2003–5/1008w.html#item2 Cited on page 471

  • The classic “hold down the shift key” attack on a DRM system.

[7] AES algorithm (Rijndael) information, at csrc.nist.gov/archive/aes/index1.html Cited on page 67

  • A good place to tap into the wealth of information available on Rijndael and the AES.

[8] Aleph One, Smashing the stack for fun and profit, Phrack, Volume Seven, Issue Forty-Nine, File 14 of 16, at www.phrack.com/issues.html?issue=49&id=14&mode=txt ...

Get Information Security: Principles and Practice, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.