Skip to main content

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 24))

  • 26 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis und Bibliographie

  1. Security Analysis and Enhancements of Computer Operating Systems; The EISOS Project; Abbott, Robert P.; Chin, Janet S.; Donnelley, J.E.; Konigsford, W.I.; Tokubo, Shigeru; Webb, Douglas A.; Eds.: Linden, Theodore A.; NTIS; Springfield, Va.; April 1976; PB-257 087

    Google Scholar 

  2. Secure Commercial Digital Communications; Abene, Peter V.; NTIS; Springfield, Va.; July 1977; AD-A046 887; Orig. Pep. No.: CI-77-83

    Google Scholar 

  3. The Design and Analysis of Computer Algorithms; Aho, Alfred V.; Hopcroft, John E.; Ullman, Jeffrey D.; Eddison-Wesley; Beading, Mass.; 1976

    Google Scholar 

  4. Some Mathematical Aspects of Cryptography; Albert, A.A.; University of Chicago

    Google Scholar 

  5. ANSI/X3/SPARC; Systems, Study Group on Data Base Management; in: FDT-Bulletin, Vol.7, No.2, 1975; ACM-SIGMOD; New York, N.Y.; Interim Report 75-02-08

    Google Scholar 

  6. Penetrating an operating system; a study of VM/370 integrity; Attanasio, C.R.; Markstein, P.W.; Phillips, P.J.; in: IEM Systems Journal, Vol.15, No.1, 1976, p.102–116; IBM Corp.; Armonk, N.Y.

    Google Scholar 

  7. An Approach to Countermeasures to System Penetrations; Attanasio, C.B.; IBM T.J. Watson Research Center, Yorktown Heights, N.Y.; IBM Research Division; San Jose; Yorktown; Zurich; October 1977; BC 6782 (#29127)

    Google Scholar 

  8. On Distributed Communications IX. Security, Secrecy and Tamper-free Considerations; Baran, P.; Rand Corp.; Santa Monica, Cal.; August 1964; BM-3765-RP

    Google Scholar 

  9. Encryption for Data Security; Bartek, D.J.; in: The Honeywell Computer Journal, Vol.8, No.2, 1974, p.86–89; Honeywell Information Systems Inc.; Phoenix, Az.

    Google Scholar 

  10. On the Encipherment of Search Trees and Random Access Files; Bayer, Budolf; Metzger, J.K.; in: ACM Transactions on Database Systems, Vol.1, No.1, March 1976, p.37–52; ACM, Inc.; New York, N.Y.

    Google Scholar 

  11. An Enciphering Module for Multics; Benedict, G. Gordon; NTIS; Springfield, Va.; Jul.74; AD-782 658; Orig. Rep. No.: MAC-TM-50

    Google Scholar 

  12. Protection Analysis: Final Report; Bisbey, Richard, II; Hollingworth, Dennis; University of Southern California, Information Science Institute, Marina, del Rey, Cal.; NTIS; Springfield, Va.; May 1978; AD-A056 816; Orig. Rep. No.: ISI/SB-78-13

    Google Scholar 

  13. Chiffriermethoden und Datenschutz; Bitzer, W.; Sonderdruck AEG-Telefunken, Geschäftsbereich Weitverkehr und Kabeltechnik; 1978

    Google Scholar 

  14. Security of Number Theoretic Public Key Cryptosystems Against Random Attack; Blakley, Bob; Blakley, G.B. ; in: Cryptologia, Vol.2, No.4, Oct.78, p.305–321, (Part I), Vol.3, No. 1, Jan.79, p.29–42, (Part II); Vol.3, No.2, Apr.79, p.105–118, (Part III); Albion College; Albion, Mich.

    Google Scholar 

  15. Safeguarding cryptographic keys; Blakley, G.B.; in: Proc. of the AFIPS-NCC 1979, p.313–317; AFIPS Press; Montvale, N.J.

    Google Scholar 

  16. Pile encryption in a General-Purpose Computer; Block, Hans; National Central Bureau of Statistics; Stockholm; October 1978

    Google Scholar 

  17. Data Network Security; Part 1: Problem Survey and a Model; Elom, Rolf; Fak, Viiveke; Ingemarsson, Ingemar; Linköping University; Linköping, Sweden; Sept. 1977

    Google Scholar 

  18. Data Network Security; Part 3: Problem Survey and a Model; Elom, Rolf; Fak, Viiveke; Ingemarsson, Ingemar; Linköping University; Linköping, Sweden; Sept. 1977

    Google Scholar 

  19. Encryption Methods in Data Networks; Blom, Bolf; Forchheimer, Robert; Fak, Viiveke; Ingemarsson, Ingemar; in: Ericsson Technics, No.2, 1978

    Google Scholar 

  20. Bounds on Key Equivocation for Simple Substitution Ciphers; Blom, Rolf J.; in: IEEE Transactions on Information Theory, Vol.IT-25, No.1, January 1979, p.8–18

    Google Scholar 

  21. On Pure Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0286, Internal Report

    Google Scholar 

  22. An Upper Bound on the Key Equivokation for Pure Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0287, Internal Report

    Google Scholar 

  23. A Lower Bound on the Key Equivocation for the Simple Substitution Cipher Applied on a Binary Memoryless Source; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0288; Internal Report

    Google Scholar 

  24. A Multiple User Secrecy System; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0289, Internal Publication

    Google Scholar 

  25. Information Theoretic Analysis of Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; May 1979; Linköping Studies in Science and Technology, Dissertations, No. 41

    Google Scholar 

  26. A transformational Grammer-Based Query Processor for Access Control in a Planning System; Bonczek, Robert H.; Cash, James I.; Whinston, Andrew B.; in: ACM Transactions on Data Base Systems, Vol.2, No.4, Dec. 1977, p.326–338; ACM, Inc.; New York, N.Y.

    Google Scholar 

  27. Encryption Protection in Computer Data Communications; Branstad, Dennis K.; in: Proc. Fourth Data Communications Symposium, 7–9 Oct. 1975, Quebec, Network Structures in an Evolving Operational Environment, p.8.1–8.7; IEEE, Inc.; New York, N.Y.; IEEE Catalog No.: 75CH1001-7 DATA

    Google Scholar 

  28. Report of the Workshop on Cryptography in Support of Computer Security; held at the National Bureau of Standards; Branstad, Dennis K.; Gait, Jason; Katzke, Stuart; National Bureau of Standards, Washington D.C.; NTIS; Springfield, Va.; September 1977; PB-271 744; Orig. Rep. No.: NES IR-77-1291

    Google Scholar 

  29. Terminals: Out of Sight but Under Control; Branstad, Dennis K.; Branstad, M. ; Jeffery, S.; National Bureau of Standards, Washington, D.C.; NTIS; Springfield, Va.; 1974; PE-255 675

    Google Scholar 

  30. Draft Guidelines for Implementing and Using the NBS Data Encryption Standard; Branstad, Dennis K.; National Bureau of Standards; Washington, D.C.; November 1975

    Google Scholar 

  31. Security Aspects of Computer Networks; Branstad, Dennis K.; in: Proc. of the AIAA Computer Networks Conference, April 1978, AIAA Paper No. 73–427; American Institute of Aeronautics and Astronautics

    Google Scholar 

  32. A Note on the Complexity of Cryptography; Brassard, Gilles; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.232–233; IEEE, Inc.; New York

    Google Scholar 

  33. Equivalences of Vigenere Systems; Brawley, J.V.; Levine, Jack; in: Cryptologia, Vol.1, No.4, Oct.77, p.338–339; Albion College; Albion, Mich.

    Google Scholar 

  34. Encryption in open system interconnection; Brenner, J.B.; ISO/TC97

    Google Scholar 

  35. Cryptography Using Modular Software Elements; Bright, Herbert S.; Enison, Richard L.; in: Proc. AFIPS, NCC 1976, Vol.45, p.113–123; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  36. Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext; Bright, Herbert S.; in: Cryptologia, Vol.1, No.4, Oct.77, p.366–370; Albion College; Albion, Mich.

    Google Scholar 

  37. Simulation Confirms Proposed Encryption Algorithm; Bright, S.; in: Computerworld, 9, 47, Nov. 1975, p.8

    Google Scholar 

  38. Security in Computer Networks; Browne, Peter S.; in: Approaches to Privacy and Security in Computer Systems, NBS SP-404, March 74, p.32–37

    Google Scholar 

  39. Scrambling and Unscrambling Files for security; Burkhardt, W.H.; University of Pittsburgh, Department of Computer Science; Pittsburgh, Pa.; 1972

    Google Scholar 

  40. Computer Network Cryptography Engineering; Burris, Harrison R.; in: Proc. AFIPS, NCC 1976, Vol.45, p.91–96; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  41. An Application of Computers in Cryptography; Callas, Nicholas P.; in: Cryptologia, Vol.2, No.4, Occ.1978, p.350–364; Albion College; Albion, Mich.

    Google Scholar 

  42. Protecting Valuable Data, Part 2; Canning, Richard G.; in: EDP-ANALYZER, Vol.12, No.1, January 1974; Canning Publications, Inc.; Vista, Cal.

    Google Scholar 

  43. Integrity and Security of Personal Data; Canning, Richard G.; in: EDP-ANALYZER, Vol.14, No.4, April 1976; Canning Publications, Inc.; Vista, Cal.

    Google Scholar 

  44. Data Encryption: Is it for You?; Richard G. Canning; in: EDP-ANALYSER, Vol.16, No.12, December 1978; Canning Publications, Inc.; Vista, Cal.

    Google Scholar 

  45. A Note on Wyner’s Wiretap Channel; Carleial, Aydano E.; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol. IT-23, No.3, May 1977, p. 387–390; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  46. Protection Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology; Carlstedt, Jim; University of Southern California, Information Science Institute, Marina del Rey, Cal.; NTIS; Springfield, Va.; February 1978; AD-A053 016; Orig. Rep. No.: ISI/SE-78-10

    Google Scholar 

  47. Fast ‘infinite-key’ Privacy Transformation for Resource-sharing Systems; Carroll, John M.; McLelland, P.M.; in: Proc. of the AFIPS FJCC 1970, Vol.37, p.223–230; AFIPS Press; Montvale, N.J.

    Google Scholar 

  48. Security of Data Communications; A Realisation of Piggyback Infiltration; Carroll, John M.; Reeves, Paul; in: INFOR, Vol.11, No.3, Ont.73, p.226–231; Canadian Journal of Operations Research and Information Processing; Ottawa, Ont., CDN

    Google Scholar 

  49. The Selective Encryption Terminal: A New Approach to Privacy Protection; Carson, J.M.; The Mitre Corporation, METREK Division; Bedford, Md.; Sept. 1976; M 76–56

    Google Scholar 

  50. A Microprocessor Selective Encryption Terminal for Privacy Protection; Carson, John M.; Summers, John K.; Welch, James S. Jr.; in: Proc. of the AFIPS-NCC 1977, June 13–16, Dallas, Texas, p.35–38

    Chapter  Google Scholar 

  51. Ia Cryptographie; Ceillier, Remi; Presses Universitaires de France; Paris 1948

    Google Scholar 

  52. Computers and Cryptology; Chesson, Frederick W.; in: Datamation, Vol.19, No.1, Jan.73, p.62–81; Technical Publishing Company; Greenwich, Conn.

    Google Scholar 

  53. A new computer Cryptography: the Expanded Character Set (ECS) cipher; Chu, W.W., et al.; in: Advances in Computer Communications

    Google Scholar 

  54. CODASYL Data Base Task Group Report; Data Base Task Group; April 1971; Bezugsquelle: ACM, Inc.; New York, N.Y.

    Google Scholar 

  55. The Ubiguitous B-Tree; Corner, Douglas; in: Computing Surveys, Vol.11, No.2, June 1979, p.121–137; ACM, Inc.; New York, N.Y.

    Google Scholar 

  56. Generators for Certain Alternating Groups with Applications to Cryptography; Coppersmith, Don; Grossman, Edna; in: SIAM J. Appl. Math., Vol.29, No.4, December 1975; Orig. Rep. No.: IEM Report RC 4741

    Google Scholar 

  57. Secure Information Storage and Retrieval Using New Results in Cryptography; Culik II, K.; Maurer, H.A.; in: Information Processing letters, Vol.8, No.4, April 1979, p.181–186

    Google Scholar 

  58. Cryptographic Password Management System; Cullum, C.D.; Feistel, Horst; Smith, J.L.; in: IBM Techn. Disci. Bull., Vol.16, No.8, 1974, p.2539–2540; IBM Corp.; Armonk, N.Y.

    Google Scholar 

  59. The Feasibility of a Method of Processing Encrypted Data; Culpepper, L.M.; Naval Ship Research and Development Center, Bethesda, Md.; NTIS; Springfield, Va.; January 1977; AD-A036 713; Orig. Rep. No.: CMLD-77-02

    Google Scholar 

  60. Privacy transformations for statistical information systems; Dalenius, Tore; in: Journal of Statistical Planning and Inference, 1, 1977, p.73–86; North-Holland Publishing Company; Amsterdam

    Google Scholar 

  61. Network Security by Encryption; Davies, Davies D.W.; in: Infotech State of the Art Report, Future Networks, Vol.2: Invited Papers, 1978, p.47–63

    Google Scholar 

  62. Unicity Points in Cryptanalysis; Deavours, C.A.; in: Cryptalogia, Vol.1,. No.1, Jan.77, P.46–68; Albion College; Albion, Mich.

    Google Scholar 

  63. Analysis of the Hebern Cyptograph Using Isomorphs; Deavours, C.A.; in: Cryptologia, Vol.1, No.2, April 1977, p.167–185; Albion College; Albion, Mich.

    Google Scholar 

  64. The Kappa Test; Deavours, C.A.; in: Cryptologia, Vol.1, No. 3, July 1977, P.223–231; Albion College; Albion, Mich.

    Google Scholar 

  65. The Ithaca Connection: Computer Cryptography in the Making; Deavours, C.A.; in: Cryptologia, Vol.1, No.4, Oct.77, p.312–317; Albion College; Albion, Mich.

    Google Scholar 

  66. Proprietary Software Protection; DeMillo, Richard A.; Lipton, Richard J.; McNeil, Leonard; in: Foundations of Secure Computation (Editor: R.A DeMillo; D. P. Dobkin; A.K. Jones; R.J. Lipton), p.115–129; Academic Press; New York; London; 1978

    Google Scholar 

  67. Kwantificering in taal en crypto-analyze; Vries, M. de; Mathematisch Centrum Amsterdam, Statistische Afdeling; Rapport SP 32 (in Holländisch)

    Google Scholar 

  68. Concealment of information; Vries, M. de; Amsterdam; 1953; Synthese, Vol.9, No.3–5, p.326–336

    Google Scholar 

  69. A Critigue of the Proposed Data Encryption Standard; Diffie, Whitfield; Hellman, Martin E.; in: CACM, Vol.19, No.3, March 1976, p.164–165; ACM, Inc.; New York, N.Y.

    Google Scholar 

  70. Cryptanalysis of the NES Data Encryption Standard; Diffie, Whitfield; Hellman, Martin E.; NTIS; Springfield, Va.; May 1976; PE-262 781; Crig. Rep. No.: MEM-76-2

    Google Scholar 

  71. Multiuser Cryptographic Technigues; Diffie, Whitfield; Hellman, Martin E.; in: Proc. AFIPS, NCC 1976, Vol.45, p.109–112; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  72. New Directions in Cryptography; Diffie, Whitfield; Hellman, Martin; in: IEEE Transactions on Information Theory, Vol.IT-22, No.6, November 1976, p.644–654; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  73. Privacy and Authentication, An Introduction to Cryptography; Diffie, Whitfield; Hellman, Martin E.; May 1978

    Google Scholar 

  74. Multics Security Evaluation, Vol.III; Password and File Encryption Techniques; Downey, Peter J.; ESD, Hanscom AFB, Bedford, Md.; NTIS; Springfield, Va.; June 1977; AD-A045 279; Orig. Rep. No.: ESD-TB-74, Vol.3

    Google Scholar 

  75. Development of an Encryption System to Secure Data Transmission and Data Storage; Eberle, G.; Goodchild, W.: in: Proc. 1977 International Conference on Communications, June 12–15, 1977, p.47.5–248 – 47.5–251; IEEE, Inc.; New York, N.Y.; 1977

    Google Scholar 

  76. Abstrakte kryptographische Maschinen; Ecker, A.; in: Angewandte Informatik, Heft 5, 1975, p.201–205

    Google Scholar 

  77. CCAS — On-Line Cryptanalytic Aid System; Edwards, Daniel J.; MIT; Cambridge, Mass.; May 1966; MAC-TR-27

    Google Scholar 

  78. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard; Ehrsam, William B.; Matyas, Stephen M.; Meyer, Carl H.; Tuchman, Walter L.; in: IBM Systems Journal, Vol.17, No.2, 1978, p.106–125

    Google Scholar 

  79. Increasing Data Security through Encryption of Data Bases; Elenbo, Viiveke; Linköping university, Department of Electrical Engineering; Linköping, Sweden; June 1974; LIB-ISY-B-0035

    Google Scholar 

  80. A User Authentication Scheme not Requiring Secrecy in the Computer; Evans, Arthur Jr.; Kantrowitz, William; Weiss, Edwin; in: CACM, Vol.17, No.8, Aug.74, p.437–442; ACM, Inc.; New York, N.Y.

    Google Scholar 

  81. A hierarchical basis for encryption key management in a Computer communications network; Everton, J.K.; in: Trends and Applications 1978: distributed processing, p.25–32; IEEE Computer Society; Long Beach, Cal.; May 1978; Cat. No.: 170

    Google Scholar 

  82. Data Security by Application of Cryptographic Methods; Fak, Viiveke; Linköping University; Linköping, Sweden; 1978

    Google Scholar 

  83. Repeated Use of Codes which Detect Deception ; Fak, Viiveke; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.233–234; IEEE, Inc.; New York

    Google Scholar 

  84. Loops as Building Blocks for Computer One-Way Functions; Fak, Viiveke; Linköping university; Linköping, Sweden; May 1979; Internal Report IiTH-ISY-I-0295

    Google Scholar 

  85. Cryptographic Coding for Data-Bank Privacy; Feistel, Horst; IBM Corporation; March 1970; Research Report RC 2827 (#13260)

    Google Scholar 

  86. Cryptography and Computer Privacy; Feistel, Horst; in: Scientific American, May 1973, pp.15–23

    Google Scholar 

  87. Chiffriermethoden und Datenschutz; Teil 1; Feistel, Horst; in: IBM Nachrichten, Nr.219, Feb.74, p.21–26; IBM Deutschland GmbH; Stuttgart

    Google Scholar 

  88. Chiffrierraethoden und Datenschutz; Teil 2; Feistel, Horst; in: IBM Nachrichten, Nr.220, Apr.74, p.99–102; IBM Deutschland GmbH; Stuttgart

    Google Scholar 

  89. Some Cryptographic Techniques for Machine-to-Machine Data Communications; Feistel, Horst; Notz, A.A.; Smith, J.L.; in: Proc IEEE, Vol.63, No.11, Nov. 1975, p.1545–1554

    Google Scholar 

  90. An Authorization Model for a Shared Data Base; Fernandez, Eduardo B.; Summers, Rita C.; Coleman, C.D.; in: Proc. 1975 SIGMOD International Conference, p.23–31; ACM, Inc.; New York, N.Y.

    Google Scholar 

  91. The Relationship between Operating System and Database System Security: A Survey; Fernandez, Eduardo B.; Food, Christopher; in: Proc. of the IEEE Computer Societys First International Computer Softwarte & Applications Conference, compsac77, Chicago, Nov. 1977, p.453–462; IEEE, Inc.; IEEE Catalog No.: 77CH1291-4C

    Google Scholar 

  92. Computer Solution of Cryptograms and Ciphers; Fiellman, R.V.; 1965; Case Institute of Technology Systems Research Center Report SRC-82-A-65-32

    Google Scholar 

  93. Software Security in Networks; Fletcher, John G.; NTIS; Springfield, Va.; 1975; UCRL-76027

    Google Scholar 

  94. Data Dependent Keys for a Selective Encryption Terminal; Flynn, Robert; Campasano, Anthony S.; in: Proc. of the AFIPS-NCC 1978, June 5–8, 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh Liu), p.1127–1129; AFIPS Press; Montvale, N.J.

    Google Scholar 

  95. Dataskydd i teminaler genom Kryptering; En Implementeringsstudie; Forchheimer, Robert; Linköping Univ.

    Google Scholar 

  96. Personal Attributes Authentication Techniques; Forsen, George E.; Nelson, Mark R.; Starson, Raymond J. Jr.; NTIS; Springfield, Va.; Cet.1977; AD-A047 645; Orig. Rep. No.: PAR-77-21; RAD-TR-77-333

    Google Scholar 

  97. Execution Time Requirements for Encipherment Programs; Friedman, Theodor D.; Hoffman, Lance J.; in: CACM, Vol.17, No.8, Aug.74, p.445–449; ACM, Inc.; New York, N.Y.

    Google Scholar 

  98. Codierung zur Geheimhaltung einer Nachrichtenübertragung; Furrer, F.J.; in: Elektroniker, Nr.3, 1977

    Google Scholar 

  99. Cryptanalysis; A Study of Ciphers and their Solutions; Gaines, Helen Fouche; Dover; New York, N.Y.; 1956

    Google Scholar 

  100. A new nonlinear pseudorandom number generator; Jason, Gait; in: IEEE Transactions on Software Engineering, Vol.SE-3, No.5, Sept.77, p.359–363

    Google Scholar 

  101. Easy Entry: The Password Encryption Problem; Gait, Jason; in: Operating System Review, Vol.12, No.3, July 1978, p.54–60; ACM-SIGOPS; New York, N.Y.

    Google Scholar 

  102. A new kind of cipher that would take millions of years to break; Gardener, Martin; in: Scientific American, Vol.237, No.2, August 1977, p. 120–124; Scientific American, Inc.; New York, N.Y.

    Google Scholar 

  103. Privacy and Security in Data Banks; Garrison, William A.: Ramamoorthy, C.V.; Texas university, Austin, Texas; NTIS; Springfield, Va.; Nov.70; AD-718 406

    Google Scholar 

  104. Secure Electronic Cryptography; Geffe, P.E.; Westinghouse Electronic Comp.; 1972

    Google Scholar 

  105. How to Protect Data With Ciphers That are Really Hard to Break; Geffe, P.R.; in: Electronics, January 4, 1973, p.99–101

    Google Scholar 

  106. Codes which Detect Deception; Gilbert, E.N.; MacWilliams, F.J.; Sloane, N.J.A.; in: BSTJ, Vol.53, No.3, March 1974, p.405–424; American Telephon and Telegraph Co.; 1974

    Google Scholar 

  107. Data Privacy, Cryptology and the Computer at IBM Research; Girsdansky, M.B.; in: IBM Research Reports, Vol.7, No. 4, 1971

    Google Scholar 

  108. Cryptology, the Computer, and Data Privacy; Girsdansky, M.B.; in: Computers and Automation, Vol.21, No.4, Apr.72, p.12–19; Berkeley Enterprises, Inc.; Newtonville, Mass.

    Google Scholar 

  109. Shift Register Sequences; Golomb, S.; in: Modern Algebra Series; Holder. Cay; 1967

    Google Scholar 

  110. Datenschutzeinrichtungen in Datenbanksystemen; Griese, J.; Plesch, M.B.; Science Research Associates GmbH; Stuttgart; 1975

    Google Scholar 

  111. Group Theoretic Remarks on Cryptographic Systems Based on Two Types of Addition; Grossman, Edna; IBM Corp.; Yorktown Heights, New York; Feb.74; RC 4742 (#21102)

    Google Scholar 

  112. Analysis of Feistel-Like Cipher Weakened by Having No Rotating Key; Grossman, Edna K.; Tuckerman, Bryant; IBM Thomas J. Watson Research Center; Yorktown Heights, N.Y.; Jan. 1977; RC 6375 (#27489)

    Google Scholar 

  113. Generation of Binary Seguences with Controllable Complexity; Groth, E.; in: IEEE, Vol.IT-17, No.3, 1971, p.288–296

    Google Scholar 

  114. The Application of Cryptography for Data Base Security, Ph.D.Dissertation; Gudes, Ehud; The Ohio State University; 1976

    Google Scholar 

  115. The Application of Cryptography for Data Ease Security; Gudes, Ehud; Koch, Harvey S.; Stahl, Fred A.; in: Proc. AFIPS, NCC 1976, Vol.45, p.97–107; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  116. Implementierung von Datenbanksystemen; Härder, Theo; Carl Hanser Verlag; München, Wien; 1978

    MATH  Google Scholar 

  117. Signature Simulation and Certain Cryptographic Codes; Hammer, C.; in: CACM, Vol.14, No.1, January, 1971, p.3–14; ACH, Inc.; New York, N.Y.

    Google Scholar 

  118. On Protection in Operating Systems; Harrison, Michael A.; Buzzo, Walter L.; Ullman, Jeffrey D.; in: CACM, Vol.19, No.8, 1976, p.461–471; ACM, Inc.; New York, N.Y.

    Google Scholar 

  119. Languages for Specifying Protection Requirements in Data Base Systems, A Semantic Model (Ph.D-Thesis); Hartson H Rex; NTIS; Springfield, Va.; 1975; AD-A018 284; Orig. Rep. No.: OSU-CISBC-75-6

    Google Scholar 

  120. A Semantic Model for Data Base Protection Languages; Hartson, H Rex; Hsiao, David K.; in: Proc. IFIP Conference on Systems for large Data Bases, 1976, p.27–42; North Holland Publishing Co.; Amsterdam

    Google Scholar 

  121. Pull Protection Specifications in a Model for Data Base Protection Languages; Hartson, H Rex; Hsiao, David K.; in: Proc ACM Annual Conference 1976, p.90–95; ACM, Inc.; New York, N.Y.

    Chapter  Google Scholar 

  122. Dynamics of Database Protection Enforcement, A Preliminary Study; Hartson, H. Rex; in: Proc. of the IEEE’ Computer Society’s First International Computer Software and Applications. Conference, compsac77, p.349–356; IEEE, Inc.; New York, N.Y.; IEEE Catalog No.: 77CH1291-4C

    Google Scholar 

  123. The Network Security Center, A system level approach to computer network security; Heinrich, F.; National Bureau of Standards; Washington, D.C.; NBS 500-21

    Google Scholar 

  124. A Centralized Approach to Computer Network Security; Heinrich, Frank R.; Kaufman, David J.; in: Proc. AFIPS, NCC 1976, Vol.45, p.85–90; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  125. The Information Theoretic Approach to Cryptography; Hellman, Martin E.; Stanford University, Cal.; NTIS; Springfield, Va.; April 1974; PB-262 780; Orig. Rep. No.: MEM-76-1

    Google Scholar 

  126. The Mathematical Theory of Secrecy Systems; Hellman, Martin E.; in: IEEE International Conference on Communications, Minneapolis, 1974

    Google Scholar 

  127. Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard; Hellman, Martin E.; Merkle, P.; Schroeppel, B.; Washington, L.; Diffie, W.; Pohlig, S.; Schneider, P.; Stanford university; Nov. 1976; SEI 76-042

    Google Scholar 

  128. An Extension of the Shannon Theory Approach to Cryptography; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-23, No.3, May 1977, p.289–294

    Google Scholar 

  129. Security in Communication Networks; Hellman, Martin E.; in: Froc. of the AFIPS-NCC 1978, June 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh Liu), p.1131–1134; AFIPS Press; Montvale, N.J.

    Google Scholar 

  130. Die Mathematik neuer Verschlüsselungssysteme; Hellman, Martin E.; in: Spektrum der Wissenschaft, Heft 10, Oktober 1979, p.92–101; Spektrum der Wissenschaft Verlagsgesellschaft mbH & Co.; Weinheim

    Google Scholar 

  131. Einführung in die Codierungstheorie; Henze, E.; Bomuth, H.H.; Vieweg; Braunschweig; 1974

    MATH  Google Scholar 

  132. Kryptanalytiska synpunkter pa nagra aktuella krypteringsfunktioner (preprint); Herlestam, Tore; in: TSA dnr 8210-1, Jan.1978 (also submitted to IEEE Transactions on Information Theory, entitled ‘Critigue of Some Public-Key-Cryptosystems’); 1978

    Google Scholar 

  133. Critical Remarks on Some Public Key Cryptosystems; Herlestam, Tore; in: BIT, Vol.18, No.4, 1978, p.493–496

    Google Scholar 

  134. Cryptography in an algebraic alphabet; Hill, L.S.; in; AMM, Vol.36, 1929, p.306–312

    Google Scholar 

  135. Concerning certain linear transformation apparatus of cryptography; Hill, I.S.; in: AMM, Vol.38, 1931, pp.135–154

    Google Scholar 

  136. The Formulary Model for Flexible Privacy and Access Control in Computer Systems; Hoffman, Lance J.; in: Proc. of the AFIPS FJCC 1971, Vol.39, p.587–601; AFIPS Press; Montvale, N.J.

    Google Scholar 

  137. Security and Privacy in Computer Systems; Hoffman, Lance J.; Melville Publishing Co.; Los Angeles, Cal.; 1973

    Google Scholar 

  138. Modern Methods for Computer Security and Privacy; Hoffman, Lance J.; Prentice Hall International, Inc.; London; 1978

    Google Scholar 

  139. Bemerkungen über automatentheoretische Modelle einfacher Schlüsselverfahren; Homuth, H.H.; in: Angewandte Informatik, Heft 5, 1971, p.244–246

    Google Scholar 

  140. A Model for Data Secure Systems; Part II; Hsiao, David K.; McCauley III, E.J.; NTIS; Springfield, VA; Oct.74; Orig. Rep. No.: OSU-CISBC-TB-74-7

    Google Scholar 

  141. Database Computers; Hsiao, David K.; in: paper submitted to Summer School on Data Base Design, August 1979, Urbino, Italy; erscheint in: Advances in Computers, Academic Press, Vol.19, 1980

    Google Scholar 

  142. IBM Program Product, Programmed Cryptographic Facility, General Information Manual; Form Number GC28-0942

    Google Scholar 

  143. Data Security Through Cryptography; Form Number GC22-9062

    Google Scholar 

  144. IBM Cryptographic Subsystem; Concepts and Facilities; IBM Corp.; IBM Corp.; Kingston, New York; October 1977; Form Nr.: GC22-9063

    Google Scholar 

  145. IBM 3845/3846 Data Encryption Device, General Information; IBM Corp.; 1977; GA-27-2865

    Google Scholar 

  146. A System for Data Security based on Data Encryption; Ingemarsson, Ingemar; Blom, Rolf; Forchheimer, Robert; Linköping University; Linköping, Sweden; April 1974; Rapport LiTH-ISY-E-0032

    Google Scholar 

  147. Stochastic Transformation to Preserve Anonymity in Stored Data; Ingemarsson, I.; University of Stockholm, Department of Statistics; Aug. 1975; Report No.4

    Google Scholar 

  148. Some aspects on the use of encryption in EDP systems; Ingemarsson, I. et al.; Linköping University; November 1975

    Google Scholar 

  149. Analysis of Secret Functions with Application to Computer Cryptography; Ingemarsson, Ingemar; in: Proc. AFIPS, NCC 1976, Vol.45, p.125–127; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  150. Negotiable Documents in Automatic Data Processing; Ingemarsson, Ingemar; Linköping University, Department of Electrical Engineering; Linköping, Sweden, June 1977; LITE-ISY-I-0153

    Google Scholar 

  151. Toward a Theory of Unknown Functions; Ingemarsson, Ingemar; in: IEEE Transaction on Information Theory, Vol.IT-24, No.2, March 1978, p.238–240; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  152. Encryption in data networks with application to teletex; Ingemarsson, I.; Linköping University; 1978; Internskrift LiTH-ISY-0235

    Google Scholar 

  153. Encryption in Teletext, Ingemarsson, J.; Linköping University; 1978; Internskrift LiTK-ISY-0236

    Google Scholar 

  154. The Algebraic Structure of Public Key Distribution Systems; Ingemarsson, Ingemar; Linköping university; Linköping, Schweden; Febr. 1979; LiTH-ISY-I-0270, Internal Report

    Google Scholar 

  155. Certain Number-Theoretic Questions in Access Control; Johnson, S.M.; in: BAND Corporation, Document B-1494, NSF, Jan. 1974

    Google Scholar 

  156. The Codebreakers; The Story of Secret Writing; Kahn, David; The Macmillan Company; New York, N.Y.; 1967; Aufl.: 7 (1972)

    Google Scholar 

  157. On Speech Encryption using Waveform Scrambling; Kak, S.C.; in: BSTJ, Vol.56, No.5, 1977, p.781–808

    Google Scholar 

  158. A Structured Design of Substitution-Permutation Encryption Network; Kam, John B.; Davida, George I.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p.95–113; Academic Press; New York; London; 1978

    Google Scholar 

  159. Non-Discretionary Access Control for Decentralized Computing Systems; Karger, Faul A.; MIT, ICS, Cambridge, Mass.; Office of Naval Research, Arlington, Va.; NTIS; Springfield, Va.; May 1977; AD-A040 808; Orig. Sep. No.: MIT/LCS/TB-179; ESD-TB-77-142

    Google Scholar 

  160. Reducibility among combinatorial problems; Karp, R.M.; in: Complexity of Computer Computations (R.E. Miller, Z.W. Thatcher (Eds.)); Plenum Press, N.Y.; 1972, P.85/103

    Google Scholar 

  161. On the computational complexity of combinatorial problems; Karp, K.M.; in: Networks, Vol.5, No.1, Jan. 1975, F.45–68

    Google Scholar 

  162. Computer Data Security; Katzan, Harry Jr.; in: Computer Science Series; Van Nostrand Reinolds Co.; New York; London; 1973

    Google Scholar 

  163. The Standard Data Encryption Algorithm; Katzan, Harry, Jr.; Petrocelli Book; 1977

    Google Scholar 

  164. A Secure, National System for Electronic Funds Transfer; Kaufman, David J.; Auerbach, K.; in: Proc. APIPS, NCC 1976, Vol.45, p.129–138; APIFS Press; Montvale, N.J.; 1976

    Google Scholar 

  165. Kompatible Schnittstellen für Datenbanksysteme; Beschreibung systemneutraler Datenbankaufrufe; Version 3; Bundesminister des Innern (Hrsg.); Bonn; Juni 1979

    Google Scholar 

  166. Encryption-Based Protection Protocols for Interactive User-Computer Communication; Kent, Stephen Thomas; Massachusetts Institute of Technology; Cambridge, Mass.; May 1976; MAC-TB-162

    Google Scholar 

  167. Encryption-based Protection for Interactive User/Computer Communication; Kent, Stephen Thomas; in: Proc. of the ACM/IEEE ‘Fifth Data Communications Symposium’, Snowbird, Utah, 1977; p.5.7–5.13; IEEE, Inc.; New York, N.Y.; 1977; IEEE Catalog No.: 77CM1260-9C

    Google Scholar 

  168. An Analysis of the Structure and Complexity of Nonlinear Binary Seguence Generators; Key, E.; in: IEEE, Vol.IT-22, No.6, 1976, p.732–736

    Google Scholar 

  169. Physical Limits in Digital Electronics; Keyes, Robert W.; in: Proc. of the IEEE, Vol.63, No.5, May 1975, p.740–767; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  170. Security Architecture using Encryption; Keys, Richard P.; Clamons, Eric H.; in: Approaches to Privacy and Security in Computer Systems, NBS SP-404, March 74, p.37–41

    Google Scholar 

  171. Pile Encryption as a Security Tool; Keys, Richard B.; Clamons, Eric H.; in: The Honeywell Computer Journal, Vol.8, No.2, 1974, p.90–93; Honeywell Information Systems Inc.; Phoenix, Az.

    Google Scholar 

  172. Programmierbarer Zufallszahlengenerator mit Mikroprozessorsteuerung; Klein, M.; in: Elektronik, Heft 14, 1978, p.79–82

    Google Scholar 

  173. Public key vs. conventional key encryption; Kline, Charles S.; Popek, Gerald J.; in: Proc. of the AFIPS-NCC 1979, p.831–837; MIPS Press; Montvale, N.J.

    Google Scholar 

  174. An Efficient One-Way Enciphering Algorithm for Password Authorization; Knoble, H.D.; in: Proc, of SHAPE XLVII, August 16–20, 1976, Montreal, Quebec, Vcl.3, p.1554–1559; Share, Inc.; Chicago, 111.

    Google Scholar 

  175. An Efficient One-Hay Enciphering Algorithm for Password Protection; Knoble, A.D.; Forney, C., Jr.; Bader, F.S.; in: ACM Transactions on Math. Software, Vol.5, No.1, March 1979, p.97–107; ACM, Inc; New York, N.Y.

    Google Scholar 

  176. ALGORITHM 536 An Efficient One-Way Enciphering Algorithm [Z]; Knoble, H.D.; in: ACM Transactions on Mathem. Software, Vol.5, No.1, March 1979, p.108–111; ACM, Inc.; New York, N.Y.

    Google Scholar 

  177. The Art of Computer Programming, Vol.2; Knuth, D.E; Addison-Wesley; Reading; 1973

    Google Scholar 

  178. On the Signature Reblocking Problem in Public-Key Cryptosystems; Kohnfelder, Loren M.; in: CACM, Vol.21, No.2, February 1978, p. 179

    Google Scholar 

  179. Towards a Practical Public-key Cryptosystem; Kohnfelder, Loren M.; Massachusetts Institute of Technology; Cambridge, Mass.; May 1978, BS. Thesis

    Google Scholar 

  180. Cryptographic Methods for Data Protection; Konheim, Alan G.; IBM Thomas Watson Research Center, Yorktown Heights, N.Y.; IEM Research Division; San Jose, Cal.; March 1978; BC 7026 (#30100) Mathematics

    Google Scholar 

  181. Taxonomy of Operating System Security Flaws; The BISOS Project; Konigsford, W.L.; University of California, Lawrence Livermore laboratory; NTIS; Springfield, Va.; November 1976; UCID-17422

    Google Scholar 

  182. Einsatz der kryptographischen Codierung zur Datensicherung in Datenbanken; Kratzer, J.; in: Deutsche Luft- und Baumfahrt Forschungsbericht 74–44; DFVLB, wissenschaftliches Berichtswesen; 5000 Köln 90; 1974

    Google Scholar 

  183. Datenfernverarbeitung; Kraushaar, et al.; Siemens Verlag; München; 1972

    Google Scholar 

  184. Computer cryptographic techniques for processing and storage of confidential information; Krishnamurthy, E.V.; in: Int. Journal cf Control, Vol.12, No.5, 1970, p.753–761

    Google Scholar 

  185. Statistical Methods in Cryptanalysis (Reprint); Fullback, Salomon; Aegean Park Press; Laguna Hills, Cal.; 1977

    Google Scholar 

  186. Computer Data Security; Larson, D.I.; Naval Postgraduate School, Montery, Cal.; NTIS; Springfield, Va.; June 1974; AD-783 781

    Google Scholar 

  187. Computer Cryptography; Lawrence, L.G.; in: Proceed. SEAS Anniversary Meeting 1975, Sept.8–12, 1975, Dublin, Irland, p.431–449; SEAS; 1975

    Google Scholar 

  188. A universal digital data scrambler; Leeper, D.G.; in: BSTJ, 7ol.52, No.10., 1973, p.1851–1865

    Google Scholar 

  189. Cryptography Architecture for Information security; Lennon, Richard E.; in: IBM Systems Journal, Vol.17, No.2, 1978, p. 138–150; IBM Corporation; New York

    Google Scholar 

  190. The Gaussian Wire-Tap Channel; Leung-Yan-Cheong, S.K.; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-24, No.4, July 1978, p.451–456; IEEE, Inc.

    Google Scholar 

  191. Variable Matrix Substitucion in Algebraic Cryptography; Levine, J.; in: AMM, March 1958, p.170–178

    Google Scholar 

  192. Involutory commutants with some applications to algebraic cryptography; Levine, J.; Brawley, J.V.; in: J. Reine Angew. Math., No.224, p.20–43, 1966 und No.227, p.1–24, 1967

    Google Scholar 

  193. Some Cryptographic Applications of Permutation Polynomials; Levine, Jack; Brawley, J.J.; NTIS; Springfield, Va.; July 1976; AD-A029 028

    Google Scholar 

  194. The Two-Message Problem in Cipher Text Autokey, Part I; Levine, Jack; Killet, Michael; in: Cryptologia, Vol.3, No.3, July 1979, p. 177–186; Albion College; Albion, Mich.

    Google Scholar 

  195. Generalized feedback shift register pseudorandom number algorithm; Lewis, T.G.; Payne, W.H.; in: JACM, Vol.20, July 1973, p.456–468

    Google Scholar 

  196. Operating System Penetration; Linde, Richard B.; in: Proc. of the AFIPS NCC 1975, p.361–368; AFIPS Press; Montvale, N.J.

    Chapter  Google Scholar 

  197. Migration and Authentication of Protected Objects; Lindsay, Bruce; Gligor, Virgil; IBM Thomas J. Watson Research Center; Yorktown Heights, N.Y.; August 1978; RJ2298 (#31040) Computer Science

    Google Scholar 

  198. Efficient Reducibility Between Programming Systems: Preliminary Report; Lynch, Nancy A.; Blum, Edward K.; in: Proc. Ninth Symposium on the Theory of Computing, Boulder, May 1977, p.228–238; ACM, Inc.; New York, N.Y.

    Google Scholar 

  199. Belative Complexity of Algebras; Lynch, Nancy A.; Blum, Edward K.; submitted for publication

    Google Scholar 

  200. Security, Accuracy, and Privacy in Computer Systems; Martin, James; Prentice-Hall, Inc.- Englewood Cliffs, N.J.; 1974; 13-798991-1

    Google Scholar 

  201. A Computer Oriented Cryptoanalytic Solution for Multiple Substitution Enciphering Systems; Matyas, Stephen M.; University of Iowa; Xerox University Microfilms; Ann Arbor, Mich.; 1974

    Google Scholar 

  202. Generation, Distribution, and Installation of Cryptographic Keys; Matyas, Stephen M.; Meyer, Carl H.; in: IEM Systems Journal, Vol.17, Ho.2, 1978, p. 126–137; IBM Corporation; New York

    Google Scholar 

  203. A Model for Data Secure Systems; McCauley III, E.J.; MIS; Springfield, Va.; March 74; AD-A011 359; Crig. Fep. No.: CSU-CIS5C-TB-75-2

    Google Scholar 

  204. Effiziente Algorithmen; Mehlhorn, Kurt; in: Teubner Studienbücher Informatik; B.G. Teubner Verlag; Stuttgart; 1977

    Google Scholar 

  205. Evaluation of Technigues for Verifying Personal Identity; Meissner, Paul; National Bureau of Standards, Washington, D.C.; NTIS; Springfield, Va.; 1976; PE-255 200

    Google Scholar 

  206. Cryptology, Computers, and Common Sense; Mellen, G.E.; in: Proc. of the ATIPS NCC73, Vol.42, p.569–579; AEIPS Press; Montvale, N.J.

    Google Scholar 

  207. Hiding Information and Receipts in Trap Door Knapsacks; Merkle, Ralph C.; Hellman, Martin E.; Stanford University; Stanford, Cal.; June 1977

    Google Scholar 

  208. Secure Communications Over Insecure Channels; Merkle, Ralph C.; in: CACM, Vol.21, No.4, April 1978, p.294–299; ACM, Inc.; New York, N.Y.

    Google Scholar 

  209. Pseudorandom Codes Can be Cracked; Meyer, Carl H.; Tuchman, Salter L.; in: Electronic Design, Vol.23, November 9, 1972, p.74–76

    Google Scholar 

  210. Design Considerations for Cryptography; Meyer, Carl H.; in: Proc. of the APIPS NCC 1973, Vol.42, p.603–606; AFIFS Press; Montvale, N.J.

    Google Scholar 

  211. Enciphering Data for Secure Transmission; Meyer, Carl H.; in: Computer Design, Vol.13, No.4, April 1974, p. 129–134

    Google Scholar 

  212. Data Security for Computer Systems; Meyer, Carl H.; Tuchman, Walter L.; in: Proc. of the First Southeast Asia Regional Computer Conference (SEABCC’76), Singapore, 1976, (M. Joseph; F.C. Kohli (Eds.)), p.557–573; North-Holland Publishing Co.; Amsterdam; 1976

    Google Scholar 

  213. Data Security for Communication Systems; Meyer, Carl H.; Tuchman, Walter I.; in: Proc. of the First Southeast Asia Regional Computer Science Conference (SEARCC), Singapore, 1976, p.557–573

    Google Scholar 

  214. Ciphertext/Plaintext and Ciphertext/Key Dependence vs Number of Bounds for the Data Encryption Standard; Meyer, Carl H.; in: Proc. of the AFIPS-NCC 1978, June 5–8, 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh; Liu), p.1119–1126; AFIPS Press; Montvale, N.J.

    Google Scholar 

  215. Cryptography, A New Dimension in Computer Data Security; Meyer, Carl E.; Matyas, Stephen M.; to appear 1979

    Google Scholar 

  216. The design and operation of public-key cryptosystems; Michelman, Eric; in: Proc. of the AFIPS-NCC 1979, p.305–311; MIPS Press; Montvale, N.J.

    Google Scholar 

  217. An Overview of Recent Data Base Research; Mohan, C.; university of Texas; Austin; April 1978; SDBEG-5

    Google Scholar 

  218. Hardware Aspects of Secure Computing; Molho, Lee M.; in: Proc. of the APIPS SJCC 1970, Vol.36, p.135–141; AFIPS Press; Montvale, N.J.

    Google Scholar 

  219. Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard; Morris, Robert; Sloane, N.J.A.; Wyner, D.A.; in: Cryptologia, Vol.1, No.3, July 1977, p.281–291

    Google Scholar 

  220. Report of the Workshop on: Estimation of Significant Advances in Computer Technology; held at the NBS, August 30–31, 1976; National Bureau of Standards, Washington, D.C.; Eds.: Meissner, Paul; December 1976; NBS IR-76-1189

    Google Scholar 

  221. Data Encryption Standard; National Bureau of Standards, Washington, D.C.; NIIS; Springfield, Va.; Jan. 1977; FIPS-PUE-46

    Google Scholar 

  222. Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard; National Bureau of Standards, Washington, D.C.; Eds.: Gait, Jason; NTIS; Springfield, Va.; November 1977; PB-273 648; Orig. Rep. No.: NBS-SP-500-20

    Google Scholar 

  223. Proc. of The Conference on: Computer Security and the Data Encryption Standard; held at the NBS, February, 15, 1977; National Bureau of Standards, Washington, D.C.; Eds.: Branstad, Dennis K.; February 1978; NBS-SP-500-27

    Google Scholar 

  224. Using Encryption for Authentication in Large Networks of Computers; Needhan, Roger; Schroeder, Michael; in: CACM, Vol.21, No. 12, December 1978, p.993–999; ACM, Inc.; New York, N.Y.

    Google Scholar 

  225. Computer System Security Evaluation; Neumann, Peter G.; in: Proc. of the AFIPS-NCC 1978, Anaheim, p.1087–1095; AFIPS Press; Montvale, N.J.

    Google Scholar 

  226. Provably Secure Operating System:; The System, Its Applications, and Proofs; Final Report; Neumann, Peter G.; Boyer, R.S.; Feiertag, R.J.;; SRI International; Menlo Park, Cal.; February 1977

    Google Scholar 

  227. Cryptographic system invulnerable to the double use of keys; Oberman, R.M.M.; in: Delft Progr. Rep., Series B (1975), p.52–56

    Google Scholar 

  228. An Approach to Secure Voice Communication Based on the Data Encryption Standard; Orceyre, M.J., et al.; in: IEEE Communications Society Magazine, Vol.16, No.6, 1978, p.41–50

    Google Scholar 

  229. Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption; Payne, W.H.; McMillen, K.I.; in: CACM, Vol.21, No.4, April 1978, p.259–263; ACM, Inc.; New York, N.Y.

    Google Scholar 

  230. System Implications of Information Privacy; Peterson, H.E.; Turn, Rein; in: Proc. of the MIPS Spring Joint Comp. Conf. 1967, Vol.30, p.291–300

    Google Scholar 

  231. Information Theoretic Analysis of Secrecy Systems; Petrovic, P.; in: Automatiker, Vol.18, No.3–4, 1977, (in kroatisch)

    Google Scholar 

  232. Encryption Schemes for Computer Confidentiality; Pless, Vera; MIT, Project MAC, Cambridge, Mass.; NTIS; Springfield, Va.; May 1975; AD-A010 217; Orig. Rep. No.: MAC-TM-63

    Google Scholar 

  233. Encryption Schemes for Computer Confidentiality; Pless, Vera S.; in: IEEE Transactions on Computers, Vol. C-26, No.11, Nov. 1977, p.1133–1136; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  234. Algetraic and Comtinatoric Aspects of Cryptography; Pohlig, Stephane.; Stanford; Oct.1977; Tech.Rep.No.6602-1

    Google Scholar 

  235. £n Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance; Pohlig, Stephan C.; Bellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-24, No.1, January 1978, p.106–110; IEEE, Inc.; New York, N.Y.

    Google Scholar 

  236. Design Issues for Secure Computer Networks; Popek, Gerald J.; Kline, Charles S.; in: lecture Notes in Computer Science, Vol.60: Operating Systems (Editors: Bayer; Graham Seegmüller), p.517–546; Springer-Verlag; Berlin; Heidelberg; New York; 1978

    Google Scholar 

  237. Encryption Protocols, Public Key Algorithms and Digital Signatures in Computer Networks; Popek, Gerald J.; Kline, Charles S.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p. 133–153; Academic Press; New York; London; 1978

    Google Scholar 

  238. A High Security log-in Procedure; Purdy, G.E.; in: CACM, Vol.17, No.8, Aug.74, p.442–445; ACM, Inc.; New York, N.Y.

    Google Scholar 

  239. Unscramble the encryption market; Quantum Science Corp.; 1978

    Google Scholar 

  240. Digitalized Signatures; Rabin, Michael C.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p.155–166; Academic Press; New York; London; 1978

    Google Scholar 

  241. Information Theory and Privacy in Data Banks; Reed, I.S.; Band Corp., Santa Monica, Cal.; NTIS; Springfield, Va.; Jan.73; AD-762 577

    Google Scholar 

  242. The Application of Information Theory to Privacy in Data Banks; Reed, I.S.; Band Corp.; 1973

    Google Scholar 

  243. ‘Cracking’ a Random Number Generator; Reeds, James; in: Cryptologia, Vol.1, No.1, p.20–26, January 1977; Albion College; Albion, Mich.

    Google Scholar 

  244. Rotor Algebra; Reeds, James; in: Cryptologia, Vol.1, No.2, April 1977, P.186–194; Albion College; Albion, Mich.

    Google Scholar 

  245. Entropy Calculations and Particular Methods of Cryptanalysis; Reeds, James; in: Cryptologia, Vol. 1, No.3, July 1977, P.235–254; Albion College; Albion, Mich.

    Google Scholar 

  246. Solution of Challenge Cipher; Reeds, James; in: Cryptologia, Vol.3, No.2, April 1979, p.83–95; Albion College; Albion, Mich.

    Google Scholar 

  247. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems; Rivest, Ronald I.; Shamir, Adi; Adleman, Len; MIT, Lab. for Computer Science; Cambridge, Mass.; April 1977; MIT/1CS/TM-82

    Google Scholar 

  248. Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem; Rivest, Ronald L.; in: Cryptologia, Vol.2, No.1, January 1978, p.62–65; Albion College; Albion, Mich

    Google Scholar 

  249. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems; Rivest, Ronald L.; Shamir, Adi; Adleman, Len; in: CACM, Vol. 21, No.2, February 1978, p.120–126

    Google Scholar 

  250. On Data Banks and Privacy Homomorphisms; Rivest, Ronald L.; Adleman, Len; Dertcuzos, Michael L.; in: Foundations of Secure Computation (Editor: R.A. DeMillo; D.P. Dobkin; A.K. Jones; R.J. Lipton), p.169–177; Academic Press; New York; London; 1978

    Google Scholar 

  251. Metoder for Kryptering av datorlagrade data; Rodin, G.; in: Electronic Systems Group, Tech. Hochsch. Stockholm; 1972

    Google Scholar 

  252. Mathematische und maschinelle Methoden beim Chiffrieren und Dechiffrieren; Rohxbach, Hans; in: FIAT Review of German Science, Applied Mathematics, p.233–257; Wiesbaden; 1948

    Google Scholar 

  253. Digital Encoding for Secure Data Communications; Rondon, Eduardo Emilio Coquis; Naval Postgraduate School, Montery, Cal.; NTIS; Springfield, Va.; September 1976; AD-A035 848

    Google Scholar 

  254. Computer Generation of Privacy Transformations; Roughan, J.L.; Hough, G.; Gwatking, J.C.; in: The Australian Computer Journal, Vol.7., No.2, July 1975, p.58–64

    Google Scholar 

  255. Computer Methods for Decrypting Multiplex Ciphers; Rubin, Frank; in: Cryptologia, Vol.2, No.2, April 1978, p.152–160; Albion College; Albion, Mich.

    Google Scholar 

  256. Formal Languages; Salomaa, A.; Academic Press; 1973

    MATH  Google Scholar 

  257. The Protection of Information in Computer Systems; Saltzer, Jerome H.; Schrceder, Michael D.; in: Proceedings of the TEEE, Vol.63, No.9, Sept.1975, p.1278–1308; IEEE, inc.; New York, N.Y.

    Google Scholar 

  258. On Digital Signatures; Saltzer, Jerome H.; in: Operating System Review, Vol.12, No.2, April 1978, p. 12–14; ACM-SIGOPS; New York, N.Y.

    Google Scholar 

  259. Speech Encryption by Manipulations of IPC Parameters; Sambur, M.R.; Jayant, N.S.; in: BSTJ, Vol.55, No.9, Nov.1976, F. 1373–1388

    Google Scholar 

  260. Some simple self-synchronising Digital Data Scramblers; Savage; in: BSTJ, Vol.45, No.2, 1967, p.449–487

    Google Scholar 

  261. Automated Analysis of Cryptograms; Schatz, Bruce E.; in: Cryptologia, Vol.2, No.2, April 1977, P. 116–142; Albion College; Albion, Mich.

    Google Scholar 

  262. Eeview of Ciphering Methods to Achieve Communication Security in Data Transmission Networks; Schmid, P.; Proc. Int. Seminar on Digital Comm.; Zurich; March 1976

    Google Scholar 

  263. Securing Data Bases under linear Queries; Schwartz, M.D.; Denning, Dorothy E.; Denning, Peter J.; in: Proc. of the IFIP Congress Information Processing 77, (Editor: B. Gilchrist), p.395–398); North-Holland Publ. Comp.; Amsterdam

    Google Scholar 

  264. Key Management in EFT-Networks; Sendrow, Marvin; in: Proceedings Computer Communication Networks, September 1978, p.351–354

    Google Scholar 

  265. Data Structures and Accessing in Data-Ease Systems; Senko, M.E.; Altmann, E.B.; Astrahan, M.M.; Fehder, P.I.; in: IEM Systems Journal, Vol.12, No.1, January 1973, p.30–93; IBM Corp.; Armonk, N.Y.

    Google Scholar 

  266. Communication Theory of Secrecy Systems; Shannon, C.E.; in: ESTJ, Vol.28, No.4, October 1949, p.656–715; American Telephone and Telegraph Comp.; New York, N.Y.

    Google Scholar 

  267. Preliminary Comments on the M.I.T. Public-Key Cryptosystem; Simmons, Gustavus J.; Norris, Michael J.; in: Cryptologia, Vol.1, No. 4, Okt.77, p.406–414; Albion College; Albion, Mich.

    Google Scholar 

  268. Two-level Disk Protection System; Sindelar, Frank I.; Hoffman, Lance J.; UC, Lawrence Livermore Lab., Livermore. Cal.; NTIS; Springfield, Va.; April 1975; UCBL-76788

    Google Scholar 

  269. Elementary Cryptanalysis; Mathematical Approach; Sinkov, Abraham; Random Hause, Inc.; The I.W. Singer Comp.; New York, N.Y.; 1968

    Google Scholar 

  270. A Consideration of the Application of Cryptographic Techniques to Data Processing; Skatrud, E.O.; in: Proc. AFIPS FJCC 1969, Vol.35, p.111–117; AFIPS Press; Montvale, N.J.

    Google Scholar 

  271. The design of Lucifer, a cryptographic device for data communications; Smith, J.; in: IBM Research Report, 1971; RC 3326

    Google Scholar 

  272. Hardware Implementation of a Cryptographic System; Smith, J.L.; in: IBM Techn. Discl. Bull., Vol.14, No.3, 1971, p.1004–1008; IBM Corp.; Armonk, N.Y.

    Google Scholar 

  273. An Experimental Application of Cryptography to Remotely Accessed Data Systems; Smith, J.I.; Notz, W.A.; Osseck, P.E.; in: Proc. ACM 25th Annual Conference 1972, p.282–297; ACM, Inc.; New York, N.Y.

    Google Scholar 

  274. On the Synthesis and Analysis of Protection Systems; Snyder, Lawrence; in: Operating Systems Review, Vol.11, No.5, Special Issue, Proceedings of the Sixth ACM Symposium on Operating Systems Principles, 16–18 November 1977, Purdue University, p.141–150; ACM-SIGCPS; New York, N.Y.

    Google Scholar 

  275. Komplexität von Entscheidungsproblemen; Ein Seminar; Specker, E.; Strassen, N.; in: lecture Notes in Computer Science, Vol.43; Springer Verlag; Berlin, Heidelberg, New York 1976

    Google Scholar 

  276. A Homophonic Cipher for Computational Cryptography; Stahl, Fred Alan; in: Proc. of the AFIPS NCC 1973, Vol.42, p.565–568; AFIPS Press; Montvale, N.J.

    Google Scholar 

  277. On Computational Security; Stahl, Fred Alan; NTIS; Springfield, Va.; Jan.74; AD-775 451; Orig. Rep. No.: UIIU-ENG-73-2241; F-637

    Google Scholar 

  278. Proposed Federal Standard 1026; Compatibility Reguirements for the use of the Data Encryption Standard; Stephan, Ed; PTSC; 1977

    Google Scholar 

  279. Access Control in a Relational Data Base Management System by Query Modification; Stonetracker, Michael; Wong, Eugene; in: Proc. ACM Annual Conference 1974, p. 180–186; ACM, Inc.; New York, N.Y.

    Google Scholar 

  280. Protecting Data by Encryption; The Proposed NFS Standard (p.82/83); Sykes, David J.; in: Datamation, Vol.22, No.8, August 1976, p.81–85; Technical Publishing Company; Greenwich, Conn.

    Google Scholar 

  281. A class of codes which detect deception and its application to data security; Tanaka et al.; in: Trans, of IECE of Japan, Vol. E60, No.7

    Google Scholar 

  282. Cryptographic Technigues for Computers; Tassel, Dennie Van; in: Proc. AFIPS SJCC 1969, Vol.34, p.367–372; AFIPS Press; Montvale, N.J.

    Google Scholar 

  283. Advanced Cryptographic Techniques for Computers; Tassel, Dennie Van; in: CACM, Vol.12, No.12, Dec.69, p.664–665; ACM, Inc.; New York, N.Y.

    Google Scholar 

  284. Random numbers generated by linear recurrence module two; Tausworthe, E.C.; in: Math. Comput., Vol.19, p.201–209, 1965

    Google Scholar 

  285. Word Error Rates in Cryptographic ensembles; Torrieri, Don J.; in: IEEE Transactions on Aerospace and Electronic Systems, Vol.AES-9,901, 1973

    Google Scholar 

  286. Additions and Modifications to ‘Word Error Fates in Cryptographic Ensembles’; Torrieri, Don J.; in: IEEE Transactions on Aerospace and Electronic Systems, Vol.AES-10,715, 1974

    Google Scholar 

  287. Cryptographic Digital Communication; Torrieri, Don J.; Naval Research laboratory, Washington, D.C.; NTIS; Springfield, Va.; July 1975; AE-A013 212; Orig. Rep. No.: NFL-7900

    Google Scholar 

  288. A Note on Protection in Data Base Systems; Tsichritzis, D.C.; in: Proc. Intern. Workshop on Protection in Operating Systems, Paris, August 1974, p.243–248; IBIA; Les Chesnay, Rocguencourt, Domaine de Voluceau, France

    Google Scholar 

  289. Encryption Techniques and Their Implementation; Tuchman, Walter I.; in: SHARE XLV (45), Vol.1, August 1975, p. 447–455; SHABE, Inc.; 1975

    Google Scholar 

  290. Efficacy of the Data Encryption Standard in Data Processing; Tuchman, Walter I.; Meyer, Carl H.; in: Proc. of the IEEE Computer Society International Conference, compcon fall 78, computer communications networks, Computers & Communications: Interfaces & Interactions, Sept.5–8, 1978, Washington, D.C., p.340–347; IEEE, Inc.; New York, H.Y.; IEEE Catalog No.: 78CH1388-8C

    Google Scholar 

  291. A Study of the Vigenere-Vernam Single and Multiple loop Enciphering Systems; Tuckerman, Bryant; IBM Corp.; IBM Corporation; Yorktown Heights, N.Y.; May 14, 1970; Report RC-2879 (#13538)

    Google Scholar 

  292. Solution of a Substitution-Fractionation-Transposition Cipher; Tuckerman, Bryant; IBM Report; Yorktown Heights, N.Y.; 1973; RC 537

    Google Scholar 

  293. Privacy and Security in Databank Systems; Measures of Effectiveness, Costs, and Protector-Intruder Interactions; Turn, Rein; Shapiro, Norman Z.; in: Proc. of the AFIPS FJCC 1972, Vol.41, Part I, p.435–444; AFIPS Press; Montvale, N.J.

    Google Scholar 

  294. Privacy Transformations for Databank Systems; Turn, Rein; in: Proc. of the AFIPS NCC 1973, Vol.42, p.589–601; Santa Monica, Cal.

    Google Scholar 

  295. Privacy Protection in Databanks: Principles and Costs; Turn, Rein; NTIS; Springfield, Va.; 1974; AD-A023 406; Orig. Rep. No.: P-5296

    Google Scholar 

  296. Privacy Systems for Telecommunication Networks; Turn, Rein; NTIS; Springfield, Va.; Sept. 1974; AD-A031 668; Orig. Rep. No.: P-5292

    Google Scholar 

  297. Cost Implications of Privacy Protection in Data Bank Systems; Turn, Rein; Rand Corp., Santa Monica, Cal.; NTIS; Springfield, Va.; April 1975; AD-A022 186; Orig. Rep. No.: P-5321 (Rand Publication)

    Google Scholar 

  298. Classification of Personal Information for Privacy Protection Purposes; Turn, Rein; in: Proc. AFIPS, NCC 1976, Vol.45, p.301–307; AFIPS Press; Montvale, N.J.; 1976

    Google Scholar 

  299. Need to Keep Digital Data Secure?; Twigg, Terry; in: Electronic Design, Vol.23, November 9, 1972, p.68–71

    Google Scholar 

  300. Convolutional Encoding for Wyner’s Wiretap Channel; Verriest, Erik; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.234–236; IEEE, Inc.; New York

    Google Scholar 

  301. Computer Security and Protection Structures; Walker, Bruce J.; Blake, Ian F.; Dowden, Hutchinson and Ross, Inc.; Stroudsburqh, Pa.; 1977

    Google Scholar 

  302. Datensicherheit in Datenbanksystemen; Wedekind, Hartmut; in: lecture Notes in Computer Science Nr.: 39 Data Ease Systems, Proc. 5th Informatik Symposium, IBM Germany, Bad Homburg v.d.H., Sept. 24–26, 1975, p.315–338 (Hrsg.: Hasselmeier, Spruth); Springer Verlag; Berlin; Heidelberg; New York; 1976

    Google Scholar 

  303. A survey of analysis techniques for discrete algorithm; Weide, Bruce; in: Computing Surveys, Vol.9, No.4, Dec. 1977; ACM, Inc.; New York, N.Y.

    Google Scholar 

  304. System Security Analysis/Certification Methodology and Results; Weissman, Clark; System Development Corporation; Santa Monica, Cal.; October 1973; SP-3728

    Google Scholar 

  305. Design of a Secure Data Transmission System: An Implementation of Communication Theory Using a Microcomputer; West, David G.; NTIS; Springfield, Va.; May 1974; UCRL-51587

    Google Scholar 

  306. Time Sharing Computer Systems; Wilkes, M.V.; North-Holland Publishing Co.; Amsterdam, New York; 1978

    Google Scholar 

  307. Computer Science and Technology: The Use of Passwords for Controlled Access to Computer Resources; Wood, Helen M.; National Bureau of Standards, Washington D.C.; NTIS; Springfield, Va.; May 1977; PB-266-323; Orig. Rep. No.: NES SP 500-9

    Google Scholar 

  308. The Use of Passwords for Controlling Access to Remote Computer Systems and Services; Wood, Helen M.; in: Proc. of the AFIPS-NCC 1977, Dallas, Texas, p.27–33; AFIPS Press; Montvale, N.J.

    Chapter  Google Scholar 

  309. The wire-tap channel; Wyner, A.D.; in: BSTJ, Vol. 54, p.1355–1387, Oct. 1975

    Google Scholar 

  310. Security Against line Tappers; Yuen, C.K.; in: CACM, Vol.19, No.12, December 1976, p.705; ACM, Inc.; New York, N.Y.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1980 Springer-Verlag Berlin · Heidelberg

About this chapter

Cite this chapter

Ryska, N., Herda, S. (1980). Literaturverzeichnis und Bibliographie. In: Kryptographische Verfahren in der Datenverarbeitung. Informatik-Fachberichte, vol 24. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-95368-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-95368-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-09900-0

  • Online ISBN: 978-3-642-95368-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics