Bibliography
[1] M Abadi, "Explicit Communications Revisited: Two New Attacks on Authentication Protocols", in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–186
[2] M Abadi, RM Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) at ftp://gatekeeper.pa.dec.com/pub/DEC/SRC/research-reports/SRC-125.pdf
[3] A Abbasi, HC Chen, "Visualizing Authorship for Identification", in ISI 2006, LNCS 3975 pp 60–71
[4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption", in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257
[5] A Abulafia, S Brown, S Abramovich-Bar, "A Fraudulent Case Involving Novel Ink Eradication Methods", in Journal of Forensic Sciences v 41 (1996) pp 300–302
[6] DG Abraham, GM Dolan, GP Double, JV Stevens, "Transaction Security System", in IBM Systems Journal v 30 no 2 (1991) pp 206–229
[7] N Achs, "VISA confronts the con men", Cards International (20 Oct 1992) pp 8–9
[8] A Acquisti, A Friedman, R Telang, "Is There a Cost to Privacy Breaches?", Fifth Workshop on the Economics of Information Security (2006)
[9] EN Adams, "Optimising preventive maintenance of software products", IBM Journal of Research and Development, v 28 no 1 (1984) pp 2–14
[10] J Adams, 'Risk', University ...
Get Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.