Bibliography
A few notes on the bibliography: URLs are used sparingly because the pages they reference tend to move, disappear, or change. URLs are given for some older papers that are hard to locate any other way and that are posted at sites that will probably serve as archives.
The following abbreviations are used in this bibliography.
ACM | Association for Computing Machinery |
Comm | Communications |
Conf | Conference |
Corp | Corporation |
Dept | Department |
IEEE | Institute for Electrical and Electronics Engineers |
Proc | Proceedings |
Symp | Symposium |
Trans | Transactions |
Univ | University |
[ABA94] Abadi, M., and Needham, R. “Prudent Engineering Practice for Cryptographic Protocols.” Proc IEEE Symp on Security & Privacy, 1994, p122–136.
[ABB76] Abbott, R. , et al. “Security Analysis and ...
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.