Next: About this document
Up: The Eternity Service
Previous: Acknowledgements
References
- Ald95
-
``Nurse sacked for altering records after baby's death'', K Alderson, The
Times 29 November 95 p 6
- Amo94
-
`Fundamentals of Computer Security Technology', E Amoroso, Prentice Hall
1994
- And94
-
``Why Cryptosystems Fail'' in Communications of the ACM vol 37 no 11
(November 1994) pp 32-40
- AN95
-
RJ Anderson, RM Needham,
``Programming Satan's Computer'', in `Computer Science Today -- Recent
Trends and Developments', J van Leeuven (ed.), Springer Lecture Notes in
Computer Science volume 1000 pp 426-440
- Bur96
-
``Rising from the Rubble'', G Burton, in Computer Weekly (29 Feb 1996) p
20
- BFL+93
-
S Blythe, B Fraboni, S Lall, H Ahmed, U de Riu, ``Layout Reconstruction of
Complex Silicon Chips'', in IEEE J. of Solid-State Circuits v 28 no 2
(Feb 93) pp 138-145
- Cha81
-
D Chaum, ``Untraceable electronic mail, return addresses, and digital
pseudonyms'', in Communications of the ACM v 24 no 2 (Feb 1981) pp 84-88
- Cha88
-
D Chaum, ``The Dining Cryptographers Problem: Unconditional Sender and
Recipient Untraceability'', in Journal of Cryptology v 1 (1988) pp 65-75
- IBM93
-
`Up the creek? -- The business perils of computer failure', IBM, 1993
- JDK+91
-
DB Johnson, GM Dolan, MJ Kelly, AV Le, SM Matyas,
``Common Cryptographic Architecture Application Programming Interface'',
in IBM Systems Journal 30 no 2 (1991) pp 130 - 150
- Nee94
-
RM Needham, ``Denial of Service: an Example'', in Communications of the
ACM v 37 no 11 (Nov 94) pp 42-46
- Rei94
-
MK Reiter, ``Secure Agreement Protocols: Reliable and Atomic Group Multicast in
Rampart'', in Proc. ACM Conf. on Computer and Communications Security
1994 pp 68-80
- Rot95
-
J Rothenberg, ``Ensuring the Longevity of Digital Documents'', in
Scientific American (January 1995) pp 24-29
- VN94
-
BR Venkataraman, RE Newman-Wolfe, ``Performance Analysis of a Method for High
Level Prevention of Traffic Analysis Using Measurements from a Campus
Network'', in Computer Security Applications 94 pp 288-297
- Won94
-
K Wong, ``Business Continuity Planning'', in Computer Fraud and Security
Bulletin (April 94) pp 10 - 16
Ross Anderson
Tue Jun 17 15:08:09 BST 1997