Bibliography

A few notes on the bibliography: URLs are used sparingly because the pages they reference tend to move, disappear, or change. URLs are given for some older papers that are hard to locate any other way and that are posted at sites that will probably serve as archives.

The following abbreviations are used in this bibliography.

ACMAssociation for Computing Machinery
CommCommunications
ConfConference
CorpCorporation
DeptDepartment
IEEEInstitute for Electrical and Electronics Engineers
ProcProceedings
SympSymposium
TransTransactions
UnivUniversity

[ABA94] Abadi, M., and Needham, R. “Prudent Engineering Practice for Cryptographic Protocols.” Proc IEEE Symp on Security & Privacy, 1994, p122–136.

[ABB76] Abbott, R. , et al. “Security Analysis and ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.