Bibliography

[1] M Abadi, "Explicit Communications Revisited: Two New Attacks on Authentication Protocols", in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–186

[2] M Abadi, RM Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) at ftp://gatekeeper.pa.dec.com/pub/DEC/SRC/research-reports/SRC-125.pdf

[3] A Abbasi, HC Chen, "Visualizing Authorship for Identification", in ISI 2006, LNCS 3975 pp 60–71

[4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption", in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257

[5] A Abulafia, S Brown, S Abramovich-Bar, "A Fraudulent Case Involving Novel Ink Eradication Methods", in Journal of Forensic Sciences v 41 (1996) pp 300–302

[6] DG Abraham, GM Dolan, GP Double, JV Stevens, "Transaction Security System", in IBM Systems Journal v 30 no 2 (1991) pp 206–229

[7] N Achs, "VISA confronts the con men", Cards International (20 Oct 1992) pp 8–9

[8] A Acquisti, A Friedman, R Telang, "Is There a Cost to Privacy Breaches?", Fifth Workshop on the Economics of Information Security (2006)

[9] EN Adams, "Optimising preventive maintenance of software products", IBM Journal of Research and Development, v 28 no 1 (1984) pp 2–14

[10] J Adams, 'Risk', University ...

Get Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.