[Next] [Up] [Previous]
Next: About this document Up: Protecting Privacy and Information Previous: Summary

References

[1]
Standards on password usage. Technical Report FIPS PUB 112, National Institute of Standards and Technology, May 1985. Also available on the Internet.

[2]
Dave Bayer, Stuart Haber, and W. Scott Stornetta. Improving the efficiency and reliability of digital time-stamping. In R.M. Capocelli, A. DeSantis, and U. Vaccaro, editors, Sequences II: Methods in Communication, Security, and Computer Science, pages 329--334, New York, 1993. Springer-Verlag.

[3]
Comptroller General of the United States. Matter of National Institute of Standards and Technology --- Use of Electronic Data Interchange Technology to Create Valid Obligations, December 13 1991. File B-245714.

[4]
Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology, 3:99--111, 1991.

[5]
Office of Technology Assessment. Information Security and Privacy in Network Environments, September 1994. Also available on the Internet. See also the related report.

[6]
W. Richard Stevens. TCP/IP Illustrated, volume 1, The Protocols. Addison-Wesley, 1994.

[7]
U.S. Department of Commerce/National Institute of Standards and Technology. Federal Information Processing Standard FIPS PUB 186, Digital Signature Standard (DSS), May 1994. Also available on the Internet.

[8]
Michael J. Wiener. Efficient DES key search. Presented at the rump session of Crypto '93, August 1993. This paper was never published, but is available on the Internet.


Kevin S. McCurley
Sat Mar 11 16:00:15 MST 1995