Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literaturverzeichnis und Bibliographie
Security Analysis and Enhancements of Computer Operating Systems; The EISOS Project; Abbott, Robert P.; Chin, Janet S.; Donnelley, J.E.; Konigsford, W.I.; Tokubo, Shigeru; Webb, Douglas A.; Eds.: Linden, Theodore A.; NTIS; Springfield, Va.; April 1976; PB-257 087
Secure Commercial Digital Communications; Abene, Peter V.; NTIS; Springfield, Va.; July 1977; AD-A046 887; Orig. Pep. No.: CI-77-83
The Design and Analysis of Computer Algorithms; Aho, Alfred V.; Hopcroft, John E.; Ullman, Jeffrey D.; Eddison-Wesley; Beading, Mass.; 1976
Some Mathematical Aspects of Cryptography; Albert, A.A.; University of Chicago
ANSI/X3/SPARC; Systems, Study Group on Data Base Management; in: FDT-Bulletin, Vol.7, No.2, 1975; ACM-SIGMOD; New York, N.Y.; Interim Report 75-02-08
Penetrating an operating system; a study of VM/370 integrity; Attanasio, C.R.; Markstein, P.W.; Phillips, P.J.; in: IEM Systems Journal, Vol.15, No.1, 1976, p.102–116; IBM Corp.; Armonk, N.Y.
An Approach to Countermeasures to System Penetrations; Attanasio, C.B.; IBM T.J. Watson Research Center, Yorktown Heights, N.Y.; IBM Research Division; San Jose; Yorktown; Zurich; October 1977; BC 6782 (#29127)
On Distributed Communications IX. Security, Secrecy and Tamper-free Considerations; Baran, P.; Rand Corp.; Santa Monica, Cal.; August 1964; BM-3765-RP
Encryption for Data Security; Bartek, D.J.; in: The Honeywell Computer Journal, Vol.8, No.2, 1974, p.86–89; Honeywell Information Systems Inc.; Phoenix, Az.
On the Encipherment of Search Trees and Random Access Files; Bayer, Budolf; Metzger, J.K.; in: ACM Transactions on Database Systems, Vol.1, No.1, March 1976, p.37–52; ACM, Inc.; New York, N.Y.
An Enciphering Module for Multics; Benedict, G. Gordon; NTIS; Springfield, Va.; Jul.74; AD-782 658; Orig. Rep. No.: MAC-TM-50
Protection Analysis: Final Report; Bisbey, Richard, II; Hollingworth, Dennis; University of Southern California, Information Science Institute, Marina, del Rey, Cal.; NTIS; Springfield, Va.; May 1978; AD-A056 816; Orig. Rep. No.: ISI/SB-78-13
Chiffriermethoden und Datenschutz; Bitzer, W.; Sonderdruck AEG-Telefunken, Geschäftsbereich Weitverkehr und Kabeltechnik; 1978
Security of Number Theoretic Public Key Cryptosystems Against Random Attack; Blakley, Bob; Blakley, G.B. ; in: Cryptologia, Vol.2, No.4, Oct.78, p.305–321, (Part I), Vol.3, No. 1, Jan.79, p.29–42, (Part II); Vol.3, No.2, Apr.79, p.105–118, (Part III); Albion College; Albion, Mich.
Safeguarding cryptographic keys; Blakley, G.B.; in: Proc. of the AFIPS-NCC 1979, p.313–317; AFIPS Press; Montvale, N.J.
Pile encryption in a General-Purpose Computer; Block, Hans; National Central Bureau of Statistics; Stockholm; October 1978
Data Network Security; Part 1: Problem Survey and a Model; Elom, Rolf; Fak, Viiveke; Ingemarsson, Ingemar; Linköping University; Linköping, Sweden; Sept. 1977
Data Network Security; Part 3: Problem Survey and a Model; Elom, Rolf; Fak, Viiveke; Ingemarsson, Ingemar; Linköping University; Linköping, Sweden; Sept. 1977
Encryption Methods in Data Networks; Blom, Bolf; Forchheimer, Robert; Fak, Viiveke; Ingemarsson, Ingemar; in: Ericsson Technics, No.2, 1978
Bounds on Key Equivocation for Simple Substitution Ciphers; Blom, Rolf J.; in: IEEE Transactions on Information Theory, Vol.IT-25, No.1, January 1979, p.8–18
On Pure Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0286, Internal Report
An Upper Bound on the Key Equivokation for Pure Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0287, Internal Report
A Lower Bound on the Key Equivocation for the Simple Substitution Cipher Applied on a Binary Memoryless Source; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0288; Internal Report
A Multiple User Secrecy System; Blom, Rolf; Linköping University; Linköping, Schweden; April 1979; LiTH-ISY-I-0289, Internal Publication
Information Theoretic Analysis of Ciphers; Blom, Rolf; Linköping University; Linköping, Schweden; May 1979; Linköping Studies in Science and Technology, Dissertations, No. 41
A transformational Grammer-Based Query Processor for Access Control in a Planning System; Bonczek, Robert H.; Cash, James I.; Whinston, Andrew B.; in: ACM Transactions on Data Base Systems, Vol.2, No.4, Dec. 1977, p.326–338; ACM, Inc.; New York, N.Y.
Encryption Protection in Computer Data Communications; Branstad, Dennis K.; in: Proc. Fourth Data Communications Symposium, 7–9 Oct. 1975, Quebec, Network Structures in an Evolving Operational Environment, p.8.1–8.7; IEEE, Inc.; New York, N.Y.; IEEE Catalog No.: 75CH1001-7 DATA
Report of the Workshop on Cryptography in Support of Computer Security; held at the National Bureau of Standards; Branstad, Dennis K.; Gait, Jason; Katzke, Stuart; National Bureau of Standards, Washington D.C.; NTIS; Springfield, Va.; September 1977; PB-271 744; Orig. Rep. No.: NES IR-77-1291
Terminals: Out of Sight but Under Control; Branstad, Dennis K.; Branstad, M. ; Jeffery, S.; National Bureau of Standards, Washington, D.C.; NTIS; Springfield, Va.; 1974; PE-255 675
Draft Guidelines for Implementing and Using the NBS Data Encryption Standard; Branstad, Dennis K.; National Bureau of Standards; Washington, D.C.; November 1975
Security Aspects of Computer Networks; Branstad, Dennis K.; in: Proc. of the AIAA Computer Networks Conference, April 1978, AIAA Paper No. 73–427; American Institute of Aeronautics and Astronautics
A Note on the Complexity of Cryptography; Brassard, Gilles; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.232–233; IEEE, Inc.; New York
Equivalences of Vigenere Systems; Brawley, J.V.; Levine, Jack; in: Cryptologia, Vol.1, No.4, Oct.77, p.338–339; Albion College; Albion, Mich.
Encryption in open system interconnection; Brenner, J.B.; ISO/TC97
Cryptography Using Modular Software Elements; Bright, Herbert S.; Enison, Richard L.; in: Proc. AFIPS, NCC 1976, Vol.45, p.113–123; AFIPS Press; Montvale, N.J.; 1976
Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext; Bright, Herbert S.; in: Cryptologia, Vol.1, No.4, Oct.77, p.366–370; Albion College; Albion, Mich.
Simulation Confirms Proposed Encryption Algorithm; Bright, S.; in: Computerworld, 9, 47, Nov. 1975, p.8
Security in Computer Networks; Browne, Peter S.; in: Approaches to Privacy and Security in Computer Systems, NBS SP-404, March 74, p.32–37
Scrambling and Unscrambling Files for security; Burkhardt, W.H.; University of Pittsburgh, Department of Computer Science; Pittsburgh, Pa.; 1972
Computer Network Cryptography Engineering; Burris, Harrison R.; in: Proc. AFIPS, NCC 1976, Vol.45, p.91–96; AFIPS Press; Montvale, N.J.; 1976
An Application of Computers in Cryptography; Callas, Nicholas P.; in: Cryptologia, Vol.2, No.4, Occ.1978, p.350–364; Albion College; Albion, Mich.
Protecting Valuable Data, Part 2; Canning, Richard G.; in: EDP-ANALYZER, Vol.12, No.1, January 1974; Canning Publications, Inc.; Vista, Cal.
Integrity and Security of Personal Data; Canning, Richard G.; in: EDP-ANALYZER, Vol.14, No.4, April 1976; Canning Publications, Inc.; Vista, Cal.
Data Encryption: Is it for You?; Richard G. Canning; in: EDP-ANALYSER, Vol.16, No.12, December 1978; Canning Publications, Inc.; Vista, Cal.
A Note on Wyner’s Wiretap Channel; Carleial, Aydano E.; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol. IT-23, No.3, May 1977, p. 387–390; IEEE, Inc.; New York, N.Y.
Protection Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology; Carlstedt, Jim; University of Southern California, Information Science Institute, Marina del Rey, Cal.; NTIS; Springfield, Va.; February 1978; AD-A053 016; Orig. Rep. No.: ISI/SE-78-10
Fast ‘infinite-key’ Privacy Transformation for Resource-sharing Systems; Carroll, John M.; McLelland, P.M.; in: Proc. of the AFIPS FJCC 1970, Vol.37, p.223–230; AFIPS Press; Montvale, N.J.
Security of Data Communications; A Realisation of Piggyback Infiltration; Carroll, John M.; Reeves, Paul; in: INFOR, Vol.11, No.3, Ont.73, p.226–231; Canadian Journal of Operations Research and Information Processing; Ottawa, Ont., CDN
The Selective Encryption Terminal: A New Approach to Privacy Protection; Carson, J.M.; The Mitre Corporation, METREK Division; Bedford, Md.; Sept. 1976; M 76–56
A Microprocessor Selective Encryption Terminal for Privacy Protection; Carson, John M.; Summers, John K.; Welch, James S. Jr.; in: Proc. of the AFIPS-NCC 1977, June 13–16, Dallas, Texas, p.35–38
Ia Cryptographie; Ceillier, Remi; Presses Universitaires de France; Paris 1948
Computers and Cryptology; Chesson, Frederick W.; in: Datamation, Vol.19, No.1, Jan.73, p.62–81; Technical Publishing Company; Greenwich, Conn.
A new computer Cryptography: the Expanded Character Set (ECS) cipher; Chu, W.W., et al.; in: Advances in Computer Communications
CODASYL Data Base Task Group Report; Data Base Task Group; April 1971; Bezugsquelle: ACM, Inc.; New York, N.Y.
The Ubiguitous B-Tree; Corner, Douglas; in: Computing Surveys, Vol.11, No.2, June 1979, p.121–137; ACM, Inc.; New York, N.Y.
Generators for Certain Alternating Groups with Applications to Cryptography; Coppersmith, Don; Grossman, Edna; in: SIAM J. Appl. Math., Vol.29, No.4, December 1975; Orig. Rep. No.: IEM Report RC 4741
Secure Information Storage and Retrieval Using New Results in Cryptography; Culik II, K.; Maurer, H.A.; in: Information Processing letters, Vol.8, No.4, April 1979, p.181–186
Cryptographic Password Management System; Cullum, C.D.; Feistel, Horst; Smith, J.L.; in: IBM Techn. Disci. Bull., Vol.16, No.8, 1974, p.2539–2540; IBM Corp.; Armonk, N.Y.
The Feasibility of a Method of Processing Encrypted Data; Culpepper, L.M.; Naval Ship Research and Development Center, Bethesda, Md.; NTIS; Springfield, Va.; January 1977; AD-A036 713; Orig. Rep. No.: CMLD-77-02
Privacy transformations for statistical information systems; Dalenius, Tore; in: Journal of Statistical Planning and Inference, 1, 1977, p.73–86; North-Holland Publishing Company; Amsterdam
Network Security by Encryption; Davies, Davies D.W.; in: Infotech State of the Art Report, Future Networks, Vol.2: Invited Papers, 1978, p.47–63
Unicity Points in Cryptanalysis; Deavours, C.A.; in: Cryptalogia, Vol.1,. No.1, Jan.77, P.46–68; Albion College; Albion, Mich.
Analysis of the Hebern Cyptograph Using Isomorphs; Deavours, C.A.; in: Cryptologia, Vol.1, No.2, April 1977, p.167–185; Albion College; Albion, Mich.
The Kappa Test; Deavours, C.A.; in: Cryptologia, Vol.1, No. 3, July 1977, P.223–231; Albion College; Albion, Mich.
The Ithaca Connection: Computer Cryptography in the Making; Deavours, C.A.; in: Cryptologia, Vol.1, No.4, Oct.77, p.312–317; Albion College; Albion, Mich.
Proprietary Software Protection; DeMillo, Richard A.; Lipton, Richard J.; McNeil, Leonard; in: Foundations of Secure Computation (Editor: R.A DeMillo; D. P. Dobkin; A.K. Jones; R.J. Lipton), p.115–129; Academic Press; New York; London; 1978
Kwantificering in taal en crypto-analyze; Vries, M. de; Mathematisch Centrum Amsterdam, Statistische Afdeling; Rapport SP 32 (in Holländisch)
Concealment of information; Vries, M. de; Amsterdam; 1953; Synthese, Vol.9, No.3–5, p.326–336
A Critigue of the Proposed Data Encryption Standard; Diffie, Whitfield; Hellman, Martin E.; in: CACM, Vol.19, No.3, March 1976, p.164–165; ACM, Inc.; New York, N.Y.
Cryptanalysis of the NES Data Encryption Standard; Diffie, Whitfield; Hellman, Martin E.; NTIS; Springfield, Va.; May 1976; PE-262 781; Crig. Rep. No.: MEM-76-2
Multiuser Cryptographic Technigues; Diffie, Whitfield; Hellman, Martin E.; in: Proc. AFIPS, NCC 1976, Vol.45, p.109–112; AFIPS Press; Montvale, N.J.; 1976
New Directions in Cryptography; Diffie, Whitfield; Hellman, Martin; in: IEEE Transactions on Information Theory, Vol.IT-22, No.6, November 1976, p.644–654; IEEE, Inc.; New York, N.Y.
Privacy and Authentication, An Introduction to Cryptography; Diffie, Whitfield; Hellman, Martin E.; May 1978
Multics Security Evaluation, Vol.III; Password and File Encryption Techniques; Downey, Peter J.; ESD, Hanscom AFB, Bedford, Md.; NTIS; Springfield, Va.; June 1977; AD-A045 279; Orig. Rep. No.: ESD-TB-74, Vol.3
Development of an Encryption System to Secure Data Transmission and Data Storage; Eberle, G.; Goodchild, W.: in: Proc. 1977 International Conference on Communications, June 12–15, 1977, p.47.5–248 – 47.5–251; IEEE, Inc.; New York, N.Y.; 1977
Abstrakte kryptographische Maschinen; Ecker, A.; in: Angewandte Informatik, Heft 5, 1975, p.201–205
CCAS — On-Line Cryptanalytic Aid System; Edwards, Daniel J.; MIT; Cambridge, Mass.; May 1966; MAC-TR-27
A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard; Ehrsam, William B.; Matyas, Stephen M.; Meyer, Carl H.; Tuchman, Walter L.; in: IBM Systems Journal, Vol.17, No.2, 1978, p.106–125
Increasing Data Security through Encryption of Data Bases; Elenbo, Viiveke; Linköping university, Department of Electrical Engineering; Linköping, Sweden; June 1974; LIB-ISY-B-0035
A User Authentication Scheme not Requiring Secrecy in the Computer; Evans, Arthur Jr.; Kantrowitz, William; Weiss, Edwin; in: CACM, Vol.17, No.8, Aug.74, p.437–442; ACM, Inc.; New York, N.Y.
A hierarchical basis for encryption key management in a Computer communications network; Everton, J.K.; in: Trends and Applications 1978: distributed processing, p.25–32; IEEE Computer Society; Long Beach, Cal.; May 1978; Cat. No.: 170
Data Security by Application of Cryptographic Methods; Fak, Viiveke; Linköping University; Linköping, Sweden; 1978
Repeated Use of Codes which Detect Deception ; Fak, Viiveke; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.233–234; IEEE, Inc.; New York
Loops as Building Blocks for Computer One-Way Functions; Fak, Viiveke; Linköping university; Linköping, Sweden; May 1979; Internal Report IiTH-ISY-I-0295
Cryptographic Coding for Data-Bank Privacy; Feistel, Horst; IBM Corporation; March 1970; Research Report RC 2827 (#13260)
Cryptography and Computer Privacy; Feistel, Horst; in: Scientific American, May 1973, pp.15–23
Chiffriermethoden und Datenschutz; Teil 1; Feistel, Horst; in: IBM Nachrichten, Nr.219, Feb.74, p.21–26; IBM Deutschland GmbH; Stuttgart
Chiffrierraethoden und Datenschutz; Teil 2; Feistel, Horst; in: IBM Nachrichten, Nr.220, Apr.74, p.99–102; IBM Deutschland GmbH; Stuttgart
Some Cryptographic Techniques for Machine-to-Machine Data Communications; Feistel, Horst; Notz, A.A.; Smith, J.L.; in: Proc IEEE, Vol.63, No.11, Nov. 1975, p.1545–1554
An Authorization Model for a Shared Data Base; Fernandez, Eduardo B.; Summers, Rita C.; Coleman, C.D.; in: Proc. 1975 SIGMOD International Conference, p.23–31; ACM, Inc.; New York, N.Y.
The Relationship between Operating System and Database System Security: A Survey; Fernandez, Eduardo B.; Food, Christopher; in: Proc. of the IEEE Computer Society’s First International Computer Softwarte & Applications Conference, compsac77, Chicago, Nov. 1977, p.453–462; IEEE, Inc.; IEEE Catalog No.: 77CH1291-4C
Computer Solution of Cryptograms and Ciphers; Fiellman, R.V.; 1965; Case Institute of Technology Systems Research Center Report SRC-82-A-65-32
Software Security in Networks; Fletcher, John G.; NTIS; Springfield, Va.; 1975; UCRL-76027
Data Dependent Keys for a Selective Encryption Terminal; Flynn, Robert; Campasano, Anthony S.; in: Proc. of the AFIPS-NCC 1978, June 5–8, 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh Liu), p.1127–1129; AFIPS Press; Montvale, N.J.
Dataskydd i teminaler genom Kryptering; En Implementeringsstudie; Forchheimer, Robert; Linköping Univ.
Personal Attributes Authentication Techniques; Forsen, George E.; Nelson, Mark R.; Starson, Raymond J. Jr.; NTIS; Springfield, Va.; Cet.1977; AD-A047 645; Orig. Rep. No.: PAR-77-21; RAD-TR-77-333
Execution Time Requirements for Encipherment Programs; Friedman, Theodor D.; Hoffman, Lance J.; in: CACM, Vol.17, No.8, Aug.74, p.445–449; ACM, Inc.; New York, N.Y.
Codierung zur Geheimhaltung einer Nachrichtenübertragung; Furrer, F.J.; in: Elektroniker, Nr.3, 1977
Cryptanalysis; A Study of Ciphers and their Solutions; Gaines, Helen Fouche; Dover; New York, N.Y.; 1956
A new nonlinear pseudorandom number generator; Jason, Gait; in: IEEE Transactions on Software Engineering, Vol.SE-3, No.5, Sept.77, p.359–363
Easy Entry: The Password Encryption Problem; Gait, Jason; in: Operating System Review, Vol.12, No.3, July 1978, p.54–60; ACM-SIGOPS; New York, N.Y.
A new kind of cipher that would take millions of years to break; Gardener, Martin; in: Scientific American, Vol.237, No.2, August 1977, p. 120–124; Scientific American, Inc.; New York, N.Y.
Privacy and Security in Data Banks; Garrison, William A.: Ramamoorthy, C.V.; Texas university, Austin, Texas; NTIS; Springfield, Va.; Nov.70; AD-718 406
Secure Electronic Cryptography; Geffe, P.E.; Westinghouse Electronic Comp.; 1972
How to Protect Data With Ciphers That are Really Hard to Break; Geffe, P.R.; in: Electronics, January 4, 1973, p.99–101
Codes which Detect Deception; Gilbert, E.N.; MacWilliams, F.J.; Sloane, N.J.A.; in: BSTJ, Vol.53, No.3, March 1974, p.405–424; American Telephon and Telegraph Co.; 1974
Data Privacy, Cryptology and the Computer at IBM Research; Girsdansky, M.B.; in: IBM Research Reports, Vol.7, No. 4, 1971
Cryptology, the Computer, and Data Privacy; Girsdansky, M.B.; in: Computers and Automation, Vol.21, No.4, Apr.72, p.12–19; Berkeley Enterprises, Inc.; Newtonville, Mass.
Shift Register Sequences; Golomb, S.; in: Modern Algebra Series; Holder. Cay; 1967
Datenschutzeinrichtungen in Datenbanksystemen; Griese, J.; Plesch, M.B.; Science Research Associates GmbH; Stuttgart; 1975
Group Theoretic Remarks on Cryptographic Systems Based on Two Types of Addition; Grossman, Edna; IBM Corp.; Yorktown Heights, New York; Feb.74; RC 4742 (#21102)
Analysis of Feistel-Like Cipher Weakened by Having No Rotating Key; Grossman, Edna K.; Tuckerman, Bryant; IBM Thomas J. Watson Research Center; Yorktown Heights, N.Y.; Jan. 1977; RC 6375 (#27489)
Generation of Binary Seguences with Controllable Complexity; Groth, E.; in: IEEE, Vol.IT-17, No.3, 1971, p.288–296
The Application of Cryptography for Data Base Security, Ph.D.Dissertation; Gudes, Ehud; The Ohio State University; 1976
The Application of Cryptography for Data Ease Security; Gudes, Ehud; Koch, Harvey S.; Stahl, Fred A.; in: Proc. AFIPS, NCC 1976, Vol.45, p.97–107; AFIPS Press; Montvale, N.J.; 1976
Implementierung von Datenbanksystemen; Härder, Theo; Carl Hanser Verlag; München, Wien; 1978
Signature Simulation and Certain Cryptographic Codes; Hammer, C.; in: CACM, Vol.14, No.1, January, 1971, p.3–14; ACH, Inc.; New York, N.Y.
On Protection in Operating Systems; Harrison, Michael A.; Buzzo, Walter L.; Ullman, Jeffrey D.; in: CACM, Vol.19, No.8, 1976, p.461–471; ACM, Inc.; New York, N.Y.
Languages for Specifying Protection Requirements in Data Base Systems, A Semantic Model (Ph.D-Thesis); Hartson H Rex; NTIS; Springfield, Va.; 1975; AD-A018 284; Orig. Rep. No.: OSU-CISBC-75-6
A Semantic Model for Data Base Protection Languages; Hartson, H Rex; Hsiao, David K.; in: Proc. IFIP Conference on Systems for large Data Bases, 1976, p.27–42; North Holland Publishing Co.; Amsterdam
Pull Protection Specifications in a Model for Data Base Protection Languages; Hartson, H Rex; Hsiao, David K.; in: Proc ACM Annual Conference 1976, p.90–95; ACM, Inc.; New York, N.Y.
Dynamics of Database Protection Enforcement, A Preliminary Study; Hartson, H. Rex; in: Proc. of the IEEE’ Computer Society’s First International Computer Software and Applications. Conference, compsac77, p.349–356; IEEE, Inc.; New York, N.Y.; IEEE Catalog No.: 77CH1291-4C
The Network Security Center, A system level approach to computer network security; Heinrich, F.; National Bureau of Standards; Washington, D.C.; NBS 500-21
A Centralized Approach to Computer Network Security; Heinrich, Frank R.; Kaufman, David J.; in: Proc. AFIPS, NCC 1976, Vol.45, p.85–90; AFIPS Press; Montvale, N.J.; 1976
The Information Theoretic Approach to Cryptography; Hellman, Martin E.; Stanford University, Cal.; NTIS; Springfield, Va.; April 1974; PB-262 780; Orig. Rep. No.: MEM-76-1
The Mathematical Theory of Secrecy Systems; Hellman, Martin E.; in: IEEE International Conference on Communications, Minneapolis, 1974
Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard; Hellman, Martin E.; Merkle, P.; Schroeppel, B.; Washington, L.; Diffie, W.; Pohlig, S.; Schneider, P.; Stanford university; Nov. 1976; SEI 76-042
An Extension of the Shannon Theory Approach to Cryptography; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-23, No.3, May 1977, p.289–294
Security in Communication Networks; Hellman, Martin E.; in: Froc. of the AFIPS-NCC 1978, June 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh Liu), p.1131–1134; AFIPS Press; Montvale, N.J.
Die Mathematik neuer Verschlüsselungssysteme; Hellman, Martin E.; in: Spektrum der Wissenschaft, Heft 10, Oktober 1979, p.92–101; Spektrum der Wissenschaft Verlagsgesellschaft mbH & Co.; Weinheim
Einführung in die Codierungstheorie; Henze, E.; Bomuth, H.H.; Vieweg; Braunschweig; 1974
Kryptanalytiska synpunkter pa nagra aktuella krypteringsfunktioner (preprint); Herlestam, Tore; in: TSA dnr 8210-1, Jan.1978 (also submitted to IEEE Transactions on Information Theory, entitled ‘Critigue of Some Public-Key-Cryptosystems’); 1978
Critical Remarks on Some Public Key Cryptosystems; Herlestam, Tore; in: BIT, Vol.18, No.4, 1978, p.493–496
Cryptography in an algebraic alphabet; Hill, L.S.; in; AMM, Vol.36, 1929, p.306–312
Concerning certain linear transformation apparatus of cryptography; Hill, I.S.; in: AMM, Vol.38, 1931, pp.135–154
The Formulary Model for Flexible Privacy and Access Control in Computer Systems; Hoffman, Lance J.; in: Proc. of the AFIPS FJCC 1971, Vol.39, p.587–601; AFIPS Press; Montvale, N.J.
Security and Privacy in Computer Systems; Hoffman, Lance J.; Melville Publishing Co.; Los Angeles, Cal.; 1973
Modern Methods for Computer Security and Privacy; Hoffman, Lance J.; Prentice Hall International, Inc.; London; 1978
Bemerkungen über automatentheoretische Modelle einfacher Schlüsselverfahren; Homuth, H.H.; in: Angewandte Informatik, Heft 5, 1971, p.244–246
A Model for Data Secure Systems; Part II; Hsiao, David K.; McCauley III, E.J.; NTIS; Springfield, VA; Oct.74; Orig. Rep. No.: OSU-CISBC-TB-74-7
Database Computers; Hsiao, David K.; in: paper submitted to Summer School on Data Base Design, August 1979, Urbino, Italy; erscheint in: Advances in Computers, Academic Press, Vol.19, 1980
IBM Program Product, Programmed Cryptographic Facility, General Information Manual; Form Number GC28-0942
Data Security Through Cryptography; Form Number GC22-9062
IBM Cryptographic Subsystem; Concepts and Facilities; IBM Corp.; IBM Corp.; Kingston, New York; October 1977; Form Nr.: GC22-9063
IBM 3845/3846 Data Encryption Device, General Information; IBM Corp.; 1977; GA-27-2865
A System for Data Security based on Data Encryption; Ingemarsson, Ingemar; Blom, Rolf; Forchheimer, Robert; Linköping University; Linköping, Sweden; April 1974; Rapport LiTH-ISY-E-0032
Stochastic Transformation to Preserve Anonymity in Stored Data; Ingemarsson, I.; University of Stockholm, Department of Statistics; Aug. 1975; Report No.4
Some aspects on the use of encryption in EDP systems; Ingemarsson, I. et al.; Linköping University; November 1975
Analysis of Secret Functions with Application to Computer Cryptography; Ingemarsson, Ingemar; in: Proc. AFIPS, NCC 1976, Vol.45, p.125–127; AFIPS Press; Montvale, N.J.; 1976
Negotiable Documents in Automatic Data Processing; Ingemarsson, Ingemar; Linköping University, Department of Electrical Engineering; Linköping, Sweden, June 1977; LITE-ISY-I-0153
Toward a Theory of Unknown Functions; Ingemarsson, Ingemar; in: IEEE Transaction on Information Theory, Vol.IT-24, No.2, March 1978, p.238–240; IEEE, Inc.; New York, N.Y.
Encryption in data networks with application to teletex; Ingemarsson, I.; Linköping University; 1978; Internskrift LiTH-ISY-0235
Encryption in Teletext, Ingemarsson, J.; Linköping University; 1978; Internskrift LiTK-ISY-0236
The Algebraic Structure of Public Key Distribution Systems; Ingemarsson, Ingemar; Linköping university; Linköping, Schweden; Febr. 1979; LiTH-ISY-I-0270, Internal Report
Certain Number-Theoretic Questions in Access Control; Johnson, S.M.; in: BAND Corporation, Document B-1494, NSF, Jan. 1974
The Codebreakers; The Story of Secret Writing; Kahn, David; The Macmillan Company; New York, N.Y.; 1967; Aufl.: 7 (1972)
On Speech Encryption using Waveform Scrambling; Kak, S.C.; in: BSTJ, Vol.56, No.5, 1977, p.781–808
A Structured Design of Substitution-Permutation Encryption Network; Kam, John B.; Davida, George I.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p.95–113; Academic Press; New York; London; 1978
Non-Discretionary Access Control for Decentralized Computing Systems; Karger, Faul A.; MIT, ICS, Cambridge, Mass.; Office of Naval Research, Arlington, Va.; NTIS; Springfield, Va.; May 1977; AD-A040 808; Orig. Sep. No.: MIT/LCS/TB-179; ESD-TB-77-142
Reducibility among combinatorial problems; Karp, R.M.; in: Complexity of Computer Computations (R.E. Miller, Z.W. Thatcher (Eds.)); Plenum Press, N.Y.; 1972, P.85/103
On the computational complexity of combinatorial problems; Karp, K.M.; in: Networks, Vol.5, No.1, Jan. 1975, F.45–68
Computer Data Security; Katzan, Harry Jr.; in: Computer Science Series; Van Nostrand Reinolds Co.; New York; London; 1973
The Standard Data Encryption Algorithm; Katzan, Harry, Jr.; Petrocelli Book; 1977
A Secure, National System for Electronic Funds Transfer; Kaufman, David J.; Auerbach, K.; in: Proc. APIPS, NCC 1976, Vol.45, p.129–138; APIFS Press; Montvale, N.J.; 1976
Kompatible Schnittstellen für Datenbanksysteme; Beschreibung systemneutraler Datenbankaufrufe; Version 3; Bundesminister des Innern (Hrsg.); Bonn; Juni 1979
Encryption-Based Protection Protocols for Interactive User-Computer Communication; Kent, Stephen Thomas; Massachusetts Institute of Technology; Cambridge, Mass.; May 1976; MAC-TB-162
Encryption-based Protection for Interactive User/Computer Communication; Kent, Stephen Thomas; in: Proc. of the ACM/IEEE ‘Fifth Data Communications Symposium’, Snowbird, Utah, 1977; p.5.7–5.13; IEEE, Inc.; New York, N.Y.; 1977; IEEE Catalog No.: 77CM1260-9C
An Analysis of the Structure and Complexity of Nonlinear Binary Seguence Generators; Key, E.; in: IEEE, Vol.IT-22, No.6, 1976, p.732–736
Physical Limits in Digital Electronics; Keyes, Robert W.; in: Proc. of the IEEE, Vol.63, No.5, May 1975, p.740–767; IEEE, Inc.; New York, N.Y.
Security Architecture using Encryption; Keys, Richard P.; Clamons, Eric H.; in: Approaches to Privacy and Security in Computer Systems, NBS SP-404, March 74, p.37–41
Pile Encryption as a Security Tool; Keys, Richard B.; Clamons, Eric H.; in: The Honeywell Computer Journal, Vol.8, No.2, 1974, p.90–93; Honeywell Information Systems Inc.; Phoenix, Az.
Programmierbarer Zufallszahlengenerator mit Mikroprozessorsteuerung; Klein, M.; in: Elektronik, Heft 14, 1978, p.79–82
Public key vs. conventional key encryption; Kline, Charles S.; Popek, Gerald J.; in: Proc. of the AFIPS-NCC 1979, p.831–837; MIPS Press; Montvale, N.J.
An Efficient One-Way Enciphering Algorithm for Password Authorization; Knoble, H.D.; in: Proc, of SHAPE XLVII, August 16–20, 1976, Montreal, Quebec, Vcl.3, p.1554–1559; Share, Inc.; Chicago, 111.
An Efficient One-Hay Enciphering Algorithm for Password Protection; Knoble, A.D.; Forney, C., Jr.; Bader, F.S.; in: ACM Transactions on Math. Software, Vol.5, No.1, March 1979, p.97–107; ACM, Inc; New York, N.Y.
ALGORITHM 536 An Efficient One-Way Enciphering Algorithm [Z]; Knoble, H.D.; in: ACM Transactions on Mathem. Software, Vol.5, No.1, March 1979, p.108–111; ACM, Inc.; New York, N.Y.
The Art of Computer Programming, Vol.2; Knuth, D.E; Addison-Wesley; Reading; 1973
On the Signature Reblocking Problem in Public-Key Cryptosystems; Kohnfelder, Loren M.; in: CACM, Vol.21, No.2, February 1978, p. 179
Towards a Practical Public-key Cryptosystem; Kohnfelder, Loren M.; Massachusetts Institute of Technology; Cambridge, Mass.; May 1978, BS. Thesis
Cryptographic Methods for Data Protection; Konheim, Alan G.; IBM Thomas Watson Research Center, Yorktown Heights, N.Y.; IEM Research Division; San Jose, Cal.; March 1978; BC 7026 (#30100) Mathematics
Taxonomy of Operating System Security Flaws; The BISOS Project; Konigsford, W.L.; University of California, Lawrence Livermore laboratory; NTIS; Springfield, Va.; November 1976; UCID-17422
Einsatz der kryptographischen Codierung zur Datensicherung in Datenbanken; Kratzer, J.; in: Deutsche Luft- und Baumfahrt Forschungsbericht 74–44; DFVLB, wissenschaftliches Berichtswesen; 5000 Köln 90; 1974
Datenfernverarbeitung; Kraushaar, et al.; Siemens Verlag; München; 1972
Computer cryptographic techniques for processing and storage of confidential information; Krishnamurthy, E.V.; in: Int. Journal cf Control, Vol.12, No.5, 1970, p.753–761
Statistical Methods in Cryptanalysis (Reprint); Fullback, Salomon; Aegean Park Press; Laguna Hills, Cal.; 1977
Computer Data Security; Larson, D.I.; Naval Postgraduate School, Montery, Cal.; NTIS; Springfield, Va.; June 1974; AD-783 781
Computer Cryptography; Lawrence, L.G.; in: Proceed. SEAS Anniversary Meeting 1975, Sept.8–12, 1975, Dublin, Irland, p.431–449; SEAS; 1975
A universal digital data scrambler; Leeper, D.G.; in: BSTJ, 7ol.52, No.10., 1973, p.1851–1865
Cryptography Architecture for Information security; Lennon, Richard E.; in: IBM Systems Journal, Vol.17, No.2, 1978, p. 138–150; IBM Corporation; New York
The Gaussian Wire-Tap Channel; Leung-Yan-Cheong, S.K.; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-24, No.4, July 1978, p.451–456; IEEE, Inc.
Variable Matrix Substitucion in Algebraic Cryptography; Levine, J.; in: AMM, March 1958, p.170–178
Involutory commutants with some applications to algebraic cryptography; Levine, J.; Brawley, J.V.; in: J. Reine Angew. Math., No.224, p.20–43, 1966 und No.227, p.1–24, 1967
Some Cryptographic Applications of Permutation Polynomials; Levine, Jack; Brawley, J.J.; NTIS; Springfield, Va.; July 1976; AD-A029 028
The Two-Message Problem in Cipher Text Autokey, Part I; Levine, Jack; Killet, Michael; in: Cryptologia, Vol.3, No.3, July 1979, p. 177–186; Albion College; Albion, Mich.
Generalized feedback shift register pseudorandom number algorithm; Lewis, T.G.; Payne, W.H.; in: JACM, Vol.20, July 1973, p.456–468
Operating System Penetration; Linde, Richard B.; in: Proc. of the AFIPS NCC 1975, p.361–368; AFIPS Press; Montvale, N.J.
Migration and Authentication of Protected Objects; Lindsay, Bruce; Gligor, Virgil; IBM Thomas J. Watson Research Center; Yorktown Heights, N.Y.; August 1978; RJ2298 (#31040) Computer Science
Efficient Reducibility Between Programming Systems: Preliminary Report; Lynch, Nancy A.; Blum, Edward K.; in: Proc. Ninth Symposium on the Theory of Computing, Boulder, May 1977, p.228–238; ACM, Inc.; New York, N.Y.
Belative Complexity of Algebras; Lynch, Nancy A.; Blum, Edward K.; submitted for publication
Security, Accuracy, and Privacy in Computer Systems; Martin, James; Prentice-Hall, Inc.- Englewood Cliffs, N.J.; 1974; 13-798991-1
A Computer Oriented Cryptoanalytic Solution for Multiple Substitution Enciphering Systems; Matyas, Stephen M.; University of Iowa; Xerox University Microfilms; Ann Arbor, Mich.; 1974
Generation, Distribution, and Installation of Cryptographic Keys; Matyas, Stephen M.; Meyer, Carl H.; in: IEM Systems Journal, Vol.17, Ho.2, 1978, p. 126–137; IBM Corporation; New York
A Model for Data Secure Systems; McCauley III, E.J.; MIS; Springfield, Va.; March 74; AD-A011 359; Crig. Fep. No.: CSU-CIS5C-TB-75-2
Effiziente Algorithmen; Mehlhorn, Kurt; in: Teubner Studienbücher Informatik; B.G. Teubner Verlag; Stuttgart; 1977
Evaluation of Technigues for Verifying Personal Identity; Meissner, Paul; National Bureau of Standards, Washington, D.C.; NTIS; Springfield, Va.; 1976; PE-255 200
Cryptology, Computers, and Common Sense; Mellen, G.E.; in: Proc. of the ATIPS NCC73, Vol.42, p.569–579; AEIPS Press; Montvale, N.J.
Hiding Information and Receipts in Trap Door Knapsacks; Merkle, Ralph C.; Hellman, Martin E.; Stanford University; Stanford, Cal.; June 1977
Secure Communications Over Insecure Channels; Merkle, Ralph C.; in: CACM, Vol.21, No.4, April 1978, p.294–299; ACM, Inc.; New York, N.Y.
Pseudorandom Codes Can be Cracked; Meyer, Carl H.; Tuchman, Salter L.; in: Electronic Design, Vol.23, November 9, 1972, p.74–76
Design Considerations for Cryptography; Meyer, Carl H.; in: Proc. of the APIPS NCC 1973, Vol.42, p.603–606; AFIFS Press; Montvale, N.J.
Enciphering Data for Secure Transmission; Meyer, Carl H.; in: Computer Design, Vol.13, No.4, April 1974, p. 129–134
Data Security for Computer Systems; Meyer, Carl H.; Tuchman, Walter L.; in: Proc. of the First Southeast Asia Regional Computer Conference (SEABCC’76), Singapore, 1976, (M. Joseph; F.C. Kohli (Eds.)), p.557–573; North-Holland Publishing Co.; Amsterdam; 1976
Data Security for Communication Systems; Meyer, Carl H.; Tuchman, Walter I.; in: Proc. of the First Southeast Asia Regional Computer Science Conference (SEARCC), Singapore, 1976, p.557–573
Ciphertext/Plaintext and Ciphertext/Key Dependence vs Number of Bounds for the Data Encryption Standard; Meyer, Carl H.; in: Proc. of the AFIPS-NCC 1978, June 5–8, 1978, Anaheim, Cal., Vol.47 (Editors: Ghosh; Liu), p.1119–1126; AFIPS Press; Montvale, N.J.
Cryptography, A New Dimension in Computer Data Security; Meyer, Carl E.; Matyas, Stephen M.; to appear 1979
The design and operation of public-key cryptosystems; Michelman, Eric; in: Proc. of the AFIPS-NCC 1979, p.305–311; MIPS Press; Montvale, N.J.
An Overview of Recent Data Base Research; Mohan, C.; university of Texas; Austin; April 1978; SDBEG-5
Hardware Aspects of Secure Computing; Molho, Lee M.; in: Proc. of the APIPS SJCC 1970, Vol.36, p.135–141; AFIPS Press; Montvale, N.J.
Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard; Morris, Robert; Sloane, N.J.A.; Wyner, D.A.; in: Cryptologia, Vol.1, No.3, July 1977, p.281–291
Report of the Workshop on: Estimation of Significant Advances in Computer Technology; held at the NBS, August 30–31, 1976; National Bureau of Standards, Washington, D.C.; Eds.: Meissner, Paul; December 1976; NBS IR-76-1189
Data Encryption Standard; National Bureau of Standards, Washington, D.C.; NIIS; Springfield, Va.; Jan. 1977; FIPS-PUE-46
Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard; National Bureau of Standards, Washington, D.C.; Eds.: Gait, Jason; NTIS; Springfield, Va.; November 1977; PB-273 648; Orig. Rep. No.: NBS-SP-500-20
Proc. of The Conference on: Computer Security and the Data Encryption Standard; held at the NBS, February, 15, 1977; National Bureau of Standards, Washington, D.C.; Eds.: Branstad, Dennis K.; February 1978; NBS-SP-500-27
Using Encryption for Authentication in Large Networks of Computers; Needhan, Roger; Schroeder, Michael; in: CACM, Vol.21, No. 12, December 1978, p.993–999; ACM, Inc.; New York, N.Y.
Computer System Security Evaluation; Neumann, Peter G.; in: Proc. of the AFIPS-NCC 1978, Anaheim, p.1087–1095; AFIPS Press; Montvale, N.J.
Provably Secure Operating System:; The System, Its Applications, and Proofs; Final Report; Neumann, Peter G.; Boyer, R.S.; Feiertag, R.J.;; SRI International; Menlo Park, Cal.; February 1977
Cryptographic system invulnerable to the double use of keys; Oberman, R.M.M.; in: Delft Progr. Rep., Series B (1975), p.52–56
An Approach to Secure Voice Communication Based on the Data Encryption Standard; Orceyre, M.J., et al.; in: IEEE Communications Society Magazine, Vol.16, No.6, 1978, p.41–50
Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption; Payne, W.H.; McMillen, K.I.; in: CACM, Vol.21, No.4, April 1978, p.259–263; ACM, Inc.; New York, N.Y.
System Implications of Information Privacy; Peterson, H.E.; Turn, Rein; in: Proc. of the MIPS Spring Joint Comp. Conf. 1967, Vol.30, p.291–300
Information Theoretic Analysis of Secrecy Systems; Petrovic, P.; in: Automatiker, Vol.18, No.3–4, 1977, (in kroatisch)
Encryption Schemes for Computer Confidentiality; Pless, Vera; MIT, Project MAC, Cambridge, Mass.; NTIS; Springfield, Va.; May 1975; AD-A010 217; Orig. Rep. No.: MAC-TM-63
Encryption Schemes for Computer Confidentiality; Pless, Vera S.; in: IEEE Transactions on Computers, Vol. C-26, No.11, Nov. 1977, p.1133–1136; IEEE, Inc.; New York, N.Y.
Algetraic and Comtinatoric Aspects of Cryptography; Pohlig, Stephane.; Stanford; Oct.1977; Tech.Rep.No.6602-1
£n Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance; Pohlig, Stephan C.; Bellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-24, No.1, January 1978, p.106–110; IEEE, Inc.; New York, N.Y.
Design Issues for Secure Computer Networks; Popek, Gerald J.; Kline, Charles S.; in: lecture Notes in Computer Science, Vol.60: Operating Systems (Editors: Bayer; Graham Seegmüller), p.517–546; Springer-Verlag; Berlin; Heidelberg; New York; 1978
Encryption Protocols, Public Key Algorithms and Digital Signatures in Computer Networks; Popek, Gerald J.; Kline, Charles S.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p. 133–153; Academic Press; New York; London; 1978
A High Security log-in Procedure; Purdy, G.E.; in: CACM, Vol.17, No.8, Aug.74, p.442–445; ACM, Inc.; New York, N.Y.
Unscramble the encryption market; Quantum Science Corp.; 1978
Digitalized Signatures; Rabin, Michael C.; in: Foundations of Secure Computation (Editor: B.A. DeMillo; D.P. Dobkin; A.K. Jones; B.J. Lipton), p.155–166; Academic Press; New York; London; 1978
Information Theory and Privacy in Data Banks; Reed, I.S.; Band Corp., Santa Monica, Cal.; NTIS; Springfield, Va.; Jan.73; AD-762 577
The Application of Information Theory to Privacy in Data Banks; Reed, I.S.; Band Corp.; 1973
‘Cracking’ a Random Number Generator; Reeds, James; in: Cryptologia, Vol.1, No.1, p.20–26, January 1977; Albion College; Albion, Mich.
Rotor Algebra; Reeds, James; in: Cryptologia, Vol.1, No.2, April 1977, P.186–194; Albion College; Albion, Mich.
Entropy Calculations and Particular Methods of Cryptanalysis; Reeds, James; in: Cryptologia, Vol. 1, No.3, July 1977, P.235–254; Albion College; Albion, Mich.
Solution of Challenge Cipher; Reeds, James; in: Cryptologia, Vol.3, No.2, April 1979, p.83–95; Albion College; Albion, Mich.
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems; Rivest, Ronald I.; Shamir, Adi; Adleman, Len; MIT, Lab. for Computer Science; Cambridge, Mass.; April 1977; MIT/1CS/TM-82
Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem; Rivest, Ronald L.; in: Cryptologia, Vol.2, No.1, January 1978, p.62–65; Albion College; Albion, Mich
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems; Rivest, Ronald L.; Shamir, Adi; Adleman, Len; in: CACM, Vol. 21, No.2, February 1978, p.120–126
On Data Banks and Privacy Homomorphisms; Rivest, Ronald L.; Adleman, Len; Dertcuzos, Michael L.; in: Foundations of Secure Computation (Editor: R.A. DeMillo; D.P. Dobkin; A.K. Jones; R.J. Lipton), p.169–177; Academic Press; New York; London; 1978
Metoder for Kryptering av datorlagrade data; Rodin, G.; in: Electronic Systems Group, Tech. Hochsch. Stockholm; 1972
Mathematische und maschinelle Methoden beim Chiffrieren und Dechiffrieren; Rohxbach, Hans; in: FIAT Review of German Science, Applied Mathematics, p.233–257; Wiesbaden; 1948
Digital Encoding for Secure Data Communications; Rondon, Eduardo Emilio Coquis; Naval Postgraduate School, Montery, Cal.; NTIS; Springfield, Va.; September 1976; AD-A035 848
Computer Generation of Privacy Transformations; Roughan, J.L.; Hough, G.; Gwatking, J.C.; in: The Australian Computer Journal, Vol.7., No.2, July 1975, p.58–64
Computer Methods for Decrypting Multiplex Ciphers; Rubin, Frank; in: Cryptologia, Vol.2, No.2, April 1978, p.152–160; Albion College; Albion, Mich.
Formal Languages; Salomaa, A.; Academic Press; 1973
The Protection of Information in Computer Systems; Saltzer, Jerome H.; Schrceder, Michael D.; in: Proceedings of the TEEE, Vol.63, No.9, Sept.1975, p.1278–1308; IEEE, inc.; New York, N.Y.
On Digital Signatures; Saltzer, Jerome H.; in: Operating System Review, Vol.12, No.2, April 1978, p. 12–14; ACM-SIGOPS; New York, N.Y.
Speech Encryption by Manipulations of IPC Parameters; Sambur, M.R.; Jayant, N.S.; in: BSTJ, Vol.55, No.9, Nov.1976, F. 1373–1388
Some simple self-synchronising Digital Data Scramblers; Savage; in: BSTJ, Vol.45, No.2, 1967, p.449–487
Automated Analysis of Cryptograms; Schatz, Bruce E.; in: Cryptologia, Vol.2, No.2, April 1977, P. 116–142; Albion College; Albion, Mich.
Eeview of Ciphering Methods to Achieve Communication Security in Data Transmission Networks; Schmid, P.; Proc. Int. Seminar on Digital Comm.; Zurich; March 1976
Securing Data Bases under linear Queries; Schwartz, M.D.; Denning, Dorothy E.; Denning, Peter J.; in: Proc. of the IFIP Congress Information Processing 77, (Editor: B. Gilchrist), p.395–398); North-Holland Publ. Comp.; Amsterdam
Key Management in EFT-Networks; Sendrow, Marvin; in: Proceedings Computer Communication Networks, September 1978, p.351–354
Data Structures and Accessing in Data-Ease Systems; Senko, M.E.; Altmann, E.B.; Astrahan, M.M.; Fehder, P.I.; in: IEM Systems Journal, Vol.12, No.1, January 1973, p.30–93; IBM Corp.; Armonk, N.Y.
Communication Theory of Secrecy Systems; Shannon, C.E.; in: ESTJ, Vol.28, No.4, October 1949, p.656–715; American Telephone and Telegraph Comp.; New York, N.Y.
Preliminary Comments on the M.I.T. Public-Key Cryptosystem; Simmons, Gustavus J.; Norris, Michael J.; in: Cryptologia, Vol.1, No. 4, Okt.77, p.406–414; Albion College; Albion, Mich.
Two-level Disk Protection System; Sindelar, Frank I.; Hoffman, Lance J.; UC, Lawrence Livermore Lab., Livermore. Cal.; NTIS; Springfield, Va.; April 1975; UCBL-76788
Elementary Cryptanalysis; Mathematical Approach; Sinkov, Abraham; Random Hause, Inc.; The I.W. Singer Comp.; New York, N.Y.; 1968
A Consideration of the Application of Cryptographic Techniques to Data Processing; Skatrud, E.O.; in: Proc. AFIPS FJCC 1969, Vol.35, p.111–117; AFIPS Press; Montvale, N.J.
The design of Lucifer, a cryptographic device for data communications; Smith, J.; in: IBM Research Report, 1971; RC 3326
Hardware Implementation of a Cryptographic System; Smith, J.L.; in: IBM Techn. Discl. Bull., Vol.14, No.3, 1971, p.1004–1008; IBM Corp.; Armonk, N.Y.
An Experimental Application of Cryptography to Remotely Accessed Data Systems; Smith, J.I.; Notz, W.A.; Osseck, P.E.; in: Proc. ACM 25th Annual Conference 1972, p.282–297; ACM, Inc.; New York, N.Y.
On the Synthesis and Analysis of Protection Systems; Snyder, Lawrence; in: Operating Systems Review, Vol.11, No.5, Special Issue, Proceedings of the Sixth ACM Symposium on Operating Systems Principles, 16–18 November 1977, Purdue University, p.141–150; ACM-SIGCPS; New York, N.Y.
Komplexität von Entscheidungsproblemen; Ein Seminar; Specker, E.; Strassen, N.; in: lecture Notes in Computer Science, Vol.43; Springer Verlag; Berlin, Heidelberg, New York 1976
A Homophonic Cipher for Computational Cryptography; Stahl, Fred Alan; in: Proc. of the AFIPS NCC 1973, Vol.42, p.565–568; AFIPS Press; Montvale, N.J.
On Computational Security; Stahl, Fred Alan; NTIS; Springfield, Va.; Jan.74; AD-775 451; Orig. Rep. No.: UIIU-ENG-73-2241; F-637
Proposed Federal Standard 1026; Compatibility Reguirements for the use of the Data Encryption Standard; Stephan, Ed; PTSC; 1977
Access Control in a Relational Data Base Management System by Query Modification; Stonetracker, Michael; Wong, Eugene; in: Proc. ACM Annual Conference 1974, p. 180–186; ACM, Inc.; New York, N.Y.
Protecting Data by Encryption; The Proposed NFS Standard (p.82/83); Sykes, David J.; in: Datamation, Vol.22, No.8, August 1976, p.81–85; Technical Publishing Company; Greenwich, Conn.
A class of codes which detect deception and its application to data security; Tanaka et al.; in: Trans, of IECE of Japan, Vol. E60, No.7
Cryptographic Technigues for Computers; Tassel, Dennie Van; in: Proc. AFIPS SJCC 1969, Vol.34, p.367–372; AFIPS Press; Montvale, N.J.
Advanced Cryptographic Techniques for Computers; Tassel, Dennie Van; in: CACM, Vol.12, No.12, Dec.69, p.664–665; ACM, Inc.; New York, N.Y.
Random numbers generated by linear recurrence module two; Tausworthe, E.C.; in: Math. Comput., Vol.19, p.201–209, 1965
Word Error Rates in Cryptographic ensembles; Torrieri, Don J.; in: IEEE Transactions on Aerospace and Electronic Systems, Vol.AES-9,901, 1973
Additions and Modifications to ‘Word Error Fates in Cryptographic Ensembles’; Torrieri, Don J.; in: IEEE Transactions on Aerospace and Electronic Systems, Vol.AES-10,715, 1974
Cryptographic Digital Communication; Torrieri, Don J.; Naval Research laboratory, Washington, D.C.; NTIS; Springfield, Va.; July 1975; AE-A013 212; Orig. Rep. No.: NFL-7900
A Note on Protection in Data Base Systems; Tsichritzis, D.C.; in: Proc. Intern. Workshop on Protection in Operating Systems, Paris, August 1974, p.243–248; IBIA; Les Chesnay, Rocguencourt, Domaine de Voluceau, France
Encryption Techniques and Their Implementation; Tuchman, Walter I.; in: SHARE XLV (45), Vol.1, August 1975, p. 447–455; SHABE, Inc.; 1975
Efficacy of the Data Encryption Standard in Data Processing; Tuchman, Walter I.; Meyer, Carl H.; in: Proc. of the IEEE Computer Society International Conference, compcon fall 78, computer communications networks, Computers & Communications: Interfaces & Interactions, Sept.5–8, 1978, Washington, D.C., p.340–347; IEEE, Inc.; New York, H.Y.; IEEE Catalog No.: 78CH1388-8C
A Study of the Vigenere-Vernam Single and Multiple loop Enciphering Systems; Tuckerman, Bryant; IBM Corp.; IBM Corporation; Yorktown Heights, N.Y.; May 14, 1970; Report RC-2879 (#13538)
Solution of a Substitution-Fractionation-Transposition Cipher; Tuckerman, Bryant; IBM Report; Yorktown Heights, N.Y.; 1973; RC 537
Privacy and Security in Databank Systems; Measures of Effectiveness, Costs, and Protector-Intruder Interactions; Turn, Rein; Shapiro, Norman Z.; in: Proc. of the AFIPS FJCC 1972, Vol.41, Part I, p.435–444; AFIPS Press; Montvale, N.J.
Privacy Transformations for Databank Systems; Turn, Rein; in: Proc. of the AFIPS NCC 1973, Vol.42, p.589–601; Santa Monica, Cal.
Privacy Protection in Databanks: Principles and Costs; Turn, Rein; NTIS; Springfield, Va.; 1974; AD-A023 406; Orig. Rep. No.: P-5296
Privacy Systems for Telecommunication Networks; Turn, Rein; NTIS; Springfield, Va.; Sept. 1974; AD-A031 668; Orig. Rep. No.: P-5292
Cost Implications of Privacy Protection in Data Bank Systems; Turn, Rein; Rand Corp., Santa Monica, Cal.; NTIS; Springfield, Va.; April 1975; AD-A022 186; Orig. Rep. No.: P-5321 (Rand Publication)
Classification of Personal Information for Privacy Protection Purposes; Turn, Rein; in: Proc. AFIPS, NCC 1976, Vol.45, p.301–307; AFIPS Press; Montvale, N.J.; 1976
Need to Keep Digital Data Secure?; Twigg, Terry; in: Electronic Design, Vol.23, November 9, 1972, p.68–71
Convolutional Encoding for Wyner’s Wiretap Channel; Verriest, Erik; Hellman, Martin E.; in: IEEE Transactions on Information Theory, Vol.IT-25, No.2, March 1979, p.234–236; IEEE, Inc.; New York
Computer Security and Protection Structures; Walker, Bruce J.; Blake, Ian F.; Dowden, Hutchinson and Ross, Inc.; Stroudsburqh, Pa.; 1977
Datensicherheit in Datenbanksystemen; Wedekind, Hartmut; in: lecture Notes in Computer Science Nr.: 39 Data Ease Systems, Proc. 5th Informatik Symposium, IBM Germany, Bad Homburg v.d.H., Sept. 24–26, 1975, p.315–338 (Hrsg.: Hasselmeier, Spruth); Springer Verlag; Berlin; Heidelberg; New York; 1976
A survey of analysis techniques for discrete algorithm; Weide, Bruce; in: Computing Surveys, Vol.9, No.4, Dec. 1977; ACM, Inc.; New York, N.Y.
System Security Analysis/Certification Methodology and Results; Weissman, Clark; System Development Corporation; Santa Monica, Cal.; October 1973; SP-3728
Design of a Secure Data Transmission System: An Implementation of Communication Theory Using a Microcomputer; West, David G.; NTIS; Springfield, Va.; May 1974; UCRL-51587
Time Sharing Computer Systems; Wilkes, M.V.; North-Holland Publishing Co.; Amsterdam, New York; 1978
Computer Science and Technology: The Use of Passwords for Controlled Access to Computer Resources; Wood, Helen M.; National Bureau of Standards, Washington D.C.; NTIS; Springfield, Va.; May 1977; PB-266-323; Orig. Rep. No.: NES SP 500-9
The Use of Passwords for Controlling Access to Remote Computer Systems and Services; Wood, Helen M.; in: Proc. of the AFIPS-NCC 1977, Dallas, Texas, p.27–33; AFIPS Press; Montvale, N.J.
The wire-tap channel; Wyner, A.D.; in: BSTJ, Vol. 54, p.1355–1387, Oct. 1975
Security Against line Tappers; Yuen, C.K.; in: CACM, Vol.19, No.12, December 1976, p.705; ACM, Inc.; New York, N.Y.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1980 Springer-Verlag Berlin · Heidelberg
About this chapter
Cite this chapter
Ryska, N., Herda, S. (1980). Literaturverzeichnis und Bibliographie. In: Kryptographische Verfahren in der Datenverarbeitung. Informatik-Fachberichte, vol 24. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-95368-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-95368-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-09900-0
Online ISBN: 978-3-642-95368-2
eBook Packages: Springer Book Archive