Лекции сайта «РазныеРазности»



бет15/16
Дата04.07.2016
өлшемі1.75 Mb.
#177059
түріЛекции
1   ...   8   9   10   11   12   13   14   15   16

FQ03 GSM Security FAQ, http://gsmsecurity.com/faq.shtml

FS02 «In the future, eyes are the window to the wallet,» by AP, Jun. 28, 2002, http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3562920.htm

FW03 «Bioethics The Brain,» by Kenneth R. Foster, Paul Root Wolpe Arthur L. Cap Ian, IEEE Spectrum Online, June 2003, http://www.spectnim.ieee.org/WEBONLY/ publicfeature/jun03/bio.html

FW74 «The Ultra Secret», by Frederick William Winterbotham, 1974

GA03 «Frequently Asked Questions», Government Information Awareness Program, 2003, http://opengov.media.mit.edu/FAQ.html

GA98 «List of the world's most powerful computing sites», (according to Gunter Ahrendt), August 1998, http://www.computerra.ru/download/ga_a_98.html

GB01 «Project: Acoustic Kitty,» by Julian Borger, Guardian, September 11, 2001, http://www.guardian.co.uk/elsewhere/journalist/story/0,7792,550122,00.html

GC03 «Will War Swap Privacy for Security?» by Grant Gross, IDG News Service, March 20,2003

GIOO «GILC Member Letter on Council of Europe Convention on Cyber Crime,» Global Internet Liberty Campaign, October 18, 2000, http://www.gilc.org/privacy/coe letter 1000.html

GI03 «MIT winds down radio tag activity,» by Alorie Gilbert, CNET News.com, October 23,2003, http://news.com.com/2100 1008 5095957.html

GJ01 «Bush Halts Inquiry of FBI and Stirs Up a Firestorm,» by Glen Johnson, Boston Globe, Dec 14, 2001, http://www.commondreams.org/headlines01/1214 01.htm

GL02 «Pentagon Defense Strategist Previews Future Warfare,» by George Lewis, U. of Kentucky News, July 11, 2002, http://www.uky.edu/PR/News/AndyMarshall.htm

GL03 «DoD enlists RFID tags in procurement battle,» by George Leopold, ЕЕ Times, October 23,2003, http://www.eetimes.com/story/OEG20031023S0054

GO03 «Maryland Proceeds with Voting Machine Installation. Independent Analyst Submits Positive Review of Diebold Machine», Maryland Governor's Office Press Release,

September 24,2003, http://www.dbm.maryland.gov/SBE

GR03 Subject: «A precis of the new attacks against GSM encryption,» by Greg Rose, posting to cryptography@c2.net mailing list, 11 Sep 2003, http://www.mit.edu: 8008/bloom picayune/crypto/14159

GS03 «Wal Mart cancels 'smart shelf trial,» by Alorie Gilbert and Richard Shim, CNET News.com, July 9,2003, http://news.com.com/2100 1019 1023934.html

GS91 «George Bush, Skull Bones and the New World Order» by Paul Goldstein and Jeffrey Steinberg, ParaScope, April 1991, http://www.freedomdomain. com/secretsocieties/skullO 1.html

GS98a «NT critic gets audience with DOD chieftains,» by Gregory Slabodkin, GCN, October 12,1998, http://www.gcn.com/archives/gcn/1998/Octoberl2/lc.htm

GS98b «Former Microsoft contractor Ed Curry says that the company deliberately misled government buyers,» by Gregory Slabodkin, GCN, October 26, 1998, http://www.gcn. com/archives/gcn/1998/October26/8.htm

GS98c «Software glitches leave Navy Smart Ship dead in the water,» by Gregory Slabodkin, GCN, July 13,1998, http://www.gcn.com/archives/gcn/1998/julyl3/ cov2.htm

HB02 «Tests Raise Questions of Face Scan Technology's Reliability,» by Hiawatha Bray, NewsFactor Network, August 06, 2002, http://www.newsfactor.com/perl/story/ 18899.html

HB03 «Perle's Conflict Issue Is Shared By Others on His Defense Panel,» by Tom Hamburger and Dennis K. Berman, The Wall Street Journal, 27 March 2003

HK02 «Smart ID Card Worries Hong Kong», Associated Press, March 10, 2002, http://www.wired.com/news/technology/0,1282,50961,00.html

HM01 «The Very Strange Case Of The NSA And Lake Vostok In Antarctica,» by Harry Mason, Feb 28,2001, http://www.rense.com/general9/ant.htm

IAOO «Lying With Pixels,» by Ivan Amato, MIT Technology Review, July/August 2000, http://www.nodeception.com/articles/pkel.jsp

IA02 «For the Spy in the Sky, New Eyes,» by Ian Austen, New York Times, June 20, 2002, http://www.nytimes.com/2002/06/20/technology/circuits/20SPYY.html

ICOO «Interception Capabilities 2000,» by Duncan Campbell, April 1999, http://www. iptvreports.mcmail.com/stoa_cover.htm

Ш99 «Suicide Mysterieux Au Pont Bessieres,» par Ian Hamel, L'Ulustre, 26 mai 1999, http://www.illustre.ch/1999/21/suicide_21.html

IM89 «Suggestions For Anticipating Requests Under Freedom Of Information Act,» the internal NASA memo from 1989, disclosed by Rep. Howard Wolpe in 1992, http://www.fas.org/sgp/othergov/nasafoia89.html

ЮОЗ «Iraq: Regulating the newly independent Iraqi media,» Index on Censorship, 27 July 2003,http://www.indexonline.org/news/20030727_iraq.shtml

IR03 «Vote count marred by computer woes,» The Indianapolis Star Report, November 9, 2003, http://www.indystar.eom/articles/6/091021 1006 009.html

ISOO Iridium Satellite: Corporate Fact Sheet. http://www.iridium.com/corp/iri_corp story. asp?storyid=2

IS03 «Irvine Sensors Demonstrates Complete Stacked Computer,» Press Release, 22 Aug 2003, http://www.irvine sensors.com/pdf/08 22 03%20ISC%20demonstrates%20 complete%20stacked%20computer.pdf

JA01 «How the facial recognition security system works», by Joseph Atick, CNN.com chat room, Oct 1, 2001, http://edition.cnn.com/2001/COMMUNITY/10/01/atick/

JBOO «Free, anonymous information on the anarchists' Net,» by John Borland, CNET News.com, April 26, 2000, http://news.com.com/2100 1033 239756.html

JB01 «Internet Voting Project Cost Pentagon $73,809 Per Vote,» by John Dunbar, The Public Integrity Special Report, August 9, 2001, http://www.notablesoftware.com/ Press/JDunbar.html

JD01 «Pentagon braces for a makeover,» by John Dillin, The Christian Science Monitor, February 12, 2001

JD02 «French agents probe Murdoch firm,» by Jamie Doward, The Observer, March 17, 2002, http://observer.guardian.co.uk/business/story/0,6903,669046,00.html

JD03 «500 paedophiles to be tracked by satellite tags,» by Jamie Doward, Observer, Sep 21,2003, http://observer.guardian.co.uk/uk_news/story/ 0,6903,1046614,00.html

JD97 «Networking With Spooks» by John Dillon, Covert Actions Quarterly, Winter 1997, http://mediafilter.org/caq/internic

JD99 «Are Pentagon computers compromised? Analyst charges Windows NT isn't secure,» by Jon E. Dougherty, WorldNetDaily.com, Feb 23, 1999, http:// www.worldnetdaily.conVbluesky_dougherty/19990223_xnjdo_are_pentag.shtml

JE02 «Mob informant scandal involved highest levels of FBI, documents show,» by Jeff Donn, Associated Press, July 28, 2002, http://www.boston.com/news/daily/28/ fbi_mob.htm

JE98 «NSA Network Security Framework Forum (NSFF), Baltmore Maryland, March 2 1998,» by Jeremy Epstein, IEEE Cipher, 1998, http://www.ieee security.org/Cipher/ ConfReports/conf rep NSFF.html

JG97 «Cryptanalysis of Alleged A5 Stream Cipher,» by Jovan Golic, in Proceedings of EUROCRYPT'97, LNCS 1233, Springer Verlag 1997, http://jya.com/a5 hack.htm

JH01 «Free the Encyclopedias!» by Judy Heim, Technology Review, September 4, 2001, http://www.techreview.com/articles/print_version/heim090401. asp

JH03 «The Business of Fear,» by Jack Hitt, Business 2.0, June 2003, http://www.business2.com/subscribers/articles/mag/0,1640,49468,00.html

JK03 «Saving Private Lynch story 'flawed',» by John Kampfner, BBC News, 15 May 2003, http://news.bbc.co.Uk/2/hi/programmes/correspondent/3028585.stm

JL02 «Neuromarketing firm launched by Atlanta ad veteran,» by Jim Lovel, Atlanta Business Chronicle, June 17, 2002, http://atlanta.bizjournals.com/atlanta/stories/2002/06/ 17/story6.html

JL03 «ID cards protect civil liberties – Blair,» by John Leyden, The Register, 30 Sept 2003, http://www.theregister.co.Uk/content/6/33138.html

JM02 «Implantable chips make first run at personal Ш,» by Charles J. Murray, ЕЕ Times, February 16, 2002, http://www.eetimes.com/story/OEG20020215S0046

JM03 «13 million on terror watch list», by James Gordon Meek, NY Daily News, April 8, 2003, http://www.nydailynews.com/04 08 2003/news/wnj eport/story/73628p 68132c.html

JM96 «The Complete, Unofficial TEMPEST Information Page,» by Joel McNamara http://www.eskimo.com/~joehn/tempest.html

JO03 «Hollywood goes paranoid,» by Joanne Ostrow, The Denver Post, May 18, 2003, http://www.denverpost.com/Stories/0,1413,36~122~1393956,OO.html

JP01 «Roosevelt's Secret War: FDR and World War Two Espionage,» by Joseph Persico, Random House, 2001

JR01 «A Cautionary Tale for a New Age of Surveillance,» By Jeffrey Rosen, New York Times Magazine, October 7, 2001, http://www.nytimes.com/2001/10/07/magazine/ 07SURVEILLANCE.html

JS01 «Thought Police Peek Into Brains,» by Julia Scheeres, Wired News, October 05, 2001, http://www.wired.com/news/business/0,1367,4722l,00.html

JS02 «Understanding the Windows EAL4 Evaluation», by Jonathan S. Shapiro, http://eros.cs.jhu.edu/~shap/NT EAL4.html

JS03 «Three R's: Reading, Writing, RFID» by Julia Scheeres, Wired News, Oct. 24, 2003, http://www.wired.com/news/technology/0,1282,60898,00.html

JU02a «They Want Their Ш Chips Now,» by Julia Scheeres, Wired News, 06 Feb 2002, http://www.wired.com/news/privacy/0,1848,50187,00.html

JU02b «Politician Wants to 'Get Chipped',» by Julia Scheeres, Wired News, Feb. 15, 2002, http://www.wired.com/news/technology/0,1282,50435,00.html

JU02c «ID Chip's Controversial Approval,» by Julia Scheeres, Wired News, Oct. 23, 2002, http://www.wired.com/news/politics/0,1283,55952,00.html

JU03 «When Cash Is Only Skin Deep,» by Julia Scheeres, Wired News, Nov. 25, 2003, http://www.wired.com/news/technology/0,1282,61357,00.html

JWOO «Why We Spy on Our Allies,» by R. James Woolsey, The Wall Street Journal, March 17,2000, http://cryptome.org/echelon cia2.htm

JW02 «Watching your every move,» by Jane Wakefield, BBC News Online, 1 February, 2002, http://news.bbc.co.Uk/2/hi/science/nature/1789157.stm

JW03 «GSM Association downplays mobile security concerns,» by John Walko, EETimes Germany, September 3,2003, http://www.eetimes.de/at/news/OEG20030903S0018

JW94 «The Future Direction of Intelligence», address by James Woolsey to the Center for Strategic and Internatioal Studies, Washington, D.C., 18 July 1994

JY01 «Euro bank notes to embed RFID chips by 2005,» by Junko Yoshida, ЕЕ Times, December 19,2001, http://www.eetimes.com/story/OEG20011219S0016

KA98 «Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations,» by Markus Kuhn and Ross Anderson, in Information Hiding, Second International Workshop, IH'98, Portland, Oregon, USA, April 15 17, 1998, Proceedings, LNCS 1525, Springer Verlag, http://www.cl.cam.ac.uk/~mgk25/ih98 tempest.pdf

KB93 «Mobile ComSec in Europe (A5),» by Klaus Brunnstein, RISKS DIGEST, Volume 14: Issue 60,12 May 1993, http://catless.ncl.ac.uk/Risks/14.60.htmltfsubj6.1

KD92 «Hiding Space. NASA's Tips for Avoiding Scrutiny,» by Kate Doyle, Columbia Journalism Review, July/August 1992, http://www.cjr.Org/year/92/4/nasa.asp

KF03 «Brave new elections,» by Mike Keefe Feldman, Missoula Independent, Vol.14 No. 50, Dec 11,2003, http://www.missoulanews.com/News/News.asp?no=3670

KJ99 «Differential Power Analysis,» by P. Kocher, J. Jaffe, B. Jun; in Crypto 99 Proceedings, LNCS 1666, M. Wiener ed., Springer Verlag, 1999. http://www.cryptography.com/resources/whitepapers/DPA.pdf

KK99 «Design Principles for Tamper Resistant Smartcard Processors,» by Oliver Kom merling, Markus G. Kuhn, USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10 11,1999. http://www.cl.cam.ac.uk/~mgk25/sc99 tamper.pdf

KPOO «Echelon Reporter answers Ex CIA Chief,» by Kevin Poulsen, SecurityFocus.com, March 23,2000, http://www.securityfocus.eom/news/6

KP01 «Electronic warfare tactics wipe out thousands of hacked smart cards,» by Kevin Poulsen, SecurityFocus, Jan 25 2001, http://www.securityfocus.com/news/143

KR02 «Iraqi Denial and Deception Far Beyond Battlefield Tactics,» by Kathleen T. Rhem, American Forces Press Service, Oct. 8, 2002, http://www.defenselink.mil/news/ Oct2002/nl0082002 200210085.html

KR03 «Iraqis Say Lynch Raid Faced No Resistance,» by Keith B. Richburg, Washington Post, April 15, 2003, http://www.washingtonpost.com/ac2/wp dyn/A26714 2003Aprl4

LD03 «Mark of the Beast: Ш Verichip microchip called Digital Angel» by These Last Days Ministries, Revised: November 25, 2003, http://gvsregistry.4verichip.com

LG02 «Trusted Computing Platform Alliance: The Mother( board) of all Big Brothers», Lucky Green, Presentation at the 11th USENIX Security Symposium, August 2002, http://www.cypherpunks.to/TCP A_DEFCON_10.pdf

LG03 «The story behind the Lynch story,» by Lou Gelfand, Star Tribune, June 1, 2003, http://www.startribune.com/stories/782/3910734.html

LG96 «The Package» by Bernard Levine and Fred Guinther, Electronic News, Issue: 29 July 1996, http://gbop.nm.ru/lg96.htm

LG99 «More NSAKEY musings,» by Lucky Green, Crypto Gram, September 15, 1999, http://www.schneier.com/crypto gram 9909.html

LL03b «NIST Ignores Scientific Method for Voting Technology,» by Lynn Landes, Voting Machine Webpage, Dec. 15,2003, http://www.ecotalk.org/NIST.htm

LL03a «Offshore Company Captures Online Military Vote», by Lynn Landes, Voting Machine Webpage, July 16, 2003, http://www.ecotalk.org/SERVEaccenture.htm

LM03 «Computer Voting Expert Ousted From Elections Conference,» by Lynn Landes, www.EcoTalk.org, Aug 1, 2003, http://www.ecotalk.org/MercuriIACREOT.htm

LNOO «Black Mass: The Irish Mob, the FBI, and a Devil's Deal,» by Dick Lehr and Gerard O'Neill, Public Affairs, 2000

LR03 «Americans give thumbs up to biometrics,» by John Leyden, The Register, Jan 8, 2003, http://www.securityfocusonline.com/news/2001

LU02 «Information Leakage from Optical Emanations,» by Joe Loughry and David A. Umphress, ACM Trans. Info. Sys. Security, Vol. 5, No. 3, pp. 262 289. http://applied math. org/acm_optical_tempest.pdf

MA03 «Is RFK» Technology Easy to Foil?» by Mark Baard, Wired News, Nov. 18, 2003, http://www.wired.com/news/privacy/0,1848,61264,00.html

МВОЗа «GCHQ arrest over Observer spying report,» by Martin Bright, The Observer, March 9,2003, http://www.observer.co.uk/iraq/story/0,12239,910648,00.html

МВОЗЬ «Shoot to kill demand by US», by Martin Bright, The Observer, November 16, 2003,http://observer.guardian.co.uk/uk_news/story/0,6903,1086397,00.html

MB99 «Solving the Bible Code Puzzle,» by Brendan McKay, Dror Bar Natan, Maya Bar Hillel, and Gil Kalai, Statistical Science, Vol. 14 (1999) 150 173, http://cs.anu.edu.au/~bdm/dilugim/StatSci

МСОЗ «Uncensored Gore (an interview with Gore Vidal),» by Marc Cooper, LA Weekly, November 14 – 20,2003, http://www.laweekly.com/ink/03/52/features cooper.php

MDOO The 2000 Ballistic Missile Defense Applications Report, http://www.defenselink. mil/specials/missiledefense/tar02g.html

MD02 «Bible Code П: The Countdown,» by Michael Drosnin, 2002

DW02 «He's Ba a ack!» by Maureen Dowd, The New York Times, December 1, 2002, http://www.nytimes.com/2002/12/01/opinion/01DOWD.html

MD97 «Bible code,» by Michael Drosnin, 1997

MP97 1997 Space And Missile Defense Technologies Army Science and Technology Master Plan, http://www.fas.org/man/dod 101/army/docs/astmp/aD/D5C.htm

ME01 «Cops tap database to harass, intimidate,» by M.L.Elrick, Detroit Free Press, July 31,2001, http://www.freep.com/news/mich/lein31_20010731.htm

ME03 «Cryptographers sound warnings on Microsoft security plan,» by Rick Merritt, ЕЕ Times, April 15,2003, http://www.eetimes.com/story/OEG20030415S0013

MFOO «VeriSign buys Network Solutions in $21 billion deal» by Melanie Austria Farmer, CNETNews.com, March 7, 2000, http://news.com.com/2100 1023 237656.html

MF02 «Partnership is Critical to Preparation», Microsoft Froutlines, 2002 February, 18th Issue, http://www.microsoft.com/usa/government/Februaryl 8thlssue.pdf

MF98 «New security flap over Windows NT», by Mary Jo Foley, Sm@rt Reseller, September 23,1998, http://www.zdnet.com/zdnn/stories/news/0,4586,2140612,00.html

MK02 «Optical Time Domain Eavesdropping Risks of CRT Displays,» by Markus Kuhn, Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 12 15 May 2002, http://www.cl.cam.ac.uk/~mgk25/ieee02 optical.pdf

ML03 «Voting Machines Gone Wild!» by Mark Lewellen Biddle, In These Times, 11 Dec 2003, http://www.mthesetmes.cony comments.php?id=490_0_l_0_C

MM01 «Making Dead Birds The Deal of the Century,» by Michael Menduno, Wired, August 2001, http://www.wired.com/wired/archive/9.08/mustread.html?pg=8

MM03 «What's inside the government's e voting booth?» by Susan M. Menke, GCN, 14 July 2003, http://www.gcn.com/22_18/new_products technology/22718 l.html

MN02 «Homeland Insecurity,» by Merrell Noden, Popular Science, September 2002, http://www.popsci.com/popsci/science/article/0,12543,335438,00.html

PY03 «Peru wants Yale to give back relics,» by Associated Press, March 6, 2003, http://www.cnn.com/2003/WORLD/americas/03/06/peru.relic.ap/

MP03 «The Real 'Saving of Private Lynch',» by Mitch Potter, Toronto Star, May 4, 2003 http://www.refuseandresist. org/war/art.php?aid=769

MR02 «How to find hidden cameras», by Marc Roessler, preprint, 2002, http://www.tentacle.franken.de/papers/hiddencams.pdf

MR03 «Intel Backs Off Security Plan: LaGrande architecture will appear in only some chips, and can be disabled,» by Robert McMillan, IDG News Service, September 17, 2003,http://www.pcworld.com/resource/printable/article/0,aid,112519,00.asp

MS01 «Bruce Lee's Fantastic Comeback,» by Michael Stroud, Wired News, November 16, 2001, http://www. wired. com/news/digiwood/0,1412,48449,00.html

MZ02 «Scanning Tech a Blurry Picture,» by Declan McCullagh and Robert Zarate, Wired News, Feb 16, 2002, http://www.wired.com/news/print/0,1294,50470,00.html

ND03 «NDS Rejects EchoStar Lawsuit as Opportunistic and Baseless,» NDS Press Release, 20 June 2003, http://www.nds.com/newspdfs/EchoStar_200603.pdf

NH96 «Secret Power,» by Nicky Hager, Craig Potton Publishing, New Zealand, 1996.

N102 «Top Ten Most Stolen Vehicles in the U.S.» by the US National Insurance Crime Bureau (NICB), December 10, 2002, http://www.mymobileguardian.com/MG/ MG_topten.asp

N103 «NIST Symposium on Building Trust and Confidence in Voting Systems,» Gaithers burg, Maryland, Dec. 10 11,2003, http://vote.nist.gov/

NN01 «NASA and NIMA Begin Joint Review Of Mars Polar Lander Search Analysis,» NASA Press Release, 26 Mar 2001, http://sse.jpl.nasa.gov/whatsnew/pr/ 010326A.html

NP98 «Probing into C2 security claims: Is NT as secure as Microsoft has said it is?» by Nicholas Petreley, InfoWorld, July 13, 1998, http://www.infoworld.com/pageone/ opinions/petrel/980713np.htm

NR02 «GSM calls even more secure thanks to new A5/3 Algorithm,» ETSI News Release, 3 July 2002, http://www.etsi.org/pressroom/previous/2002/3algorithm.htm

NSOO «Name.Space, Inc. v. Network Solutions», US Court Of Appeals, Decided: January 21,2000, http://namespace.pgmedia.net/law/appeal/2ndcir dec.html

NS02 NavSource Online: Aircraft Carrier Photo Archive, PCU GEORGE H.W. BUSH (CVN 77), http://www.navsource.org/archives/02/77.htm

NS03 «Stop dodging the awkward truth,» by Norman Solomon, The Observer, March 9, 2003,http://www.observer.co.uk/iraq/story/0,12239,910381,00.html

NY03 «NYC police to destroy database on protesters,» by AP, Apr 11, 2003, http://www.usatoday.com/tech/news/techpolicy/2003 04 l l nypd database_x.htm

OI89 Obituary: «Intrepid» – Sir William Stephenson, Time, Feb. 13,1989, page 76

OR03 «SAIC has role in cellphone changes,» The Oak Ridger, 27 November 2003, http://www.oakridger.eom/stories/l 12703/new_20031127006.shtml

РВОЗ «Tampa police eliminate facial recognition system,» by Associated Press, 08 Aug 2003, http://www.palmbeachpost.com/news/content/news/0820camera.html

PD02 «Arlington 'Bait Car' Hooks Suspect,» by By Patricia Davis, The Washington Post, 16 April 2002, http://lists.jammed.com/crime/2002/04/0099.html

PE03 «Hall Monitors or Spies? Wireless Tech to Track Building Occupants,» by By Paul Eng, ABC News, Sept. 10, 2003, http://abcnews.go.com/sections/scitech/ Fu tureTech/smartbadges03 0910.html

PG99 «Re: Forthcoming Biryukov/Shamir result against A5/1 GSM privacy algorithm», Peter Gutmann, posting to cryptography@c2.net mailing list, 7 Dec 1999, http://www.mail archive.eom/cryptography@c2.net/msg02546.html

PKOO «Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned,» by Ton van der Putte and Jeroen Keuning, in the Proceedings of Fourth Working Conference on Smart Card Research and Advanced Applications, pages 289 303, Kluwer Academic Publishers, 2000; http://cryptome.org/fake prints.htm

PK03 «In the Company of Spies,» by Paul Kaihla, Business 2.0, May 01, 2003, http://www.business2.com/subscribers/articles/mag/0,1640,49068,00.html.

PK96 «Timing Attacks on Implementations of Diffie Hellman, RSA, DSS, and Other Systems,» by P. Kocher, in Crypto 96 Proceedings, LNCS 1109, Springer Verlag, 1996. http://www.cryptography.com/resources/whitepapers/TimingAttacks.pdf

PL98 «Re: Status of GSM Crypto Attacks», Paul Leyland, posting to uk crypto@maillist.ox.ac.uk mailing list, 21 Oct 1998, http://jya.com/gsml02898.htm

PR02 «Can a Hacker Outfox Microsoft?» by Peter Rojas, Oct. 18, 2002, Wired News, http://www.wired.com/news/technology/0,1282,55807,00.html

PR03 «Poll Examines Saddam, 9 11 Link,» Associated Press, September 06, 2003, http://wireservice.wired.com/wired/story.asp?section=BreakingstoryId=779532

PS02 «Prison Statistics On June 30, 2002,» U.S. Department of Justice, Bureau of Justice Statistics, 2002, http://www.ojp.usdoj.gov/bjs/prisons.htm

PW87 «Spycatcher – The Candid Autobiography of a Senior Intelligence Officer,» by Peter Wright, William Heinemann Australia, 1987

QA03 «QA On Facial Recognition,» ACLU Web feature on face recognition technology, 2003,http://www.aclu.org/Privacy/Privacy.cfm?ro=13434c=130

RA03 «Trusted Computing Frequently Asked Questions – TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCP A» by Ross Anderson, Version 1.1 (August 2003), http://www.cl.cam.ac.uk/~rjal4/tcpa faq.html

RA94 «Subject: A5», Ross Anderson, posting to Newsgroups: sci.crypt,alt.security; 17 Jun, 1994, http://www.ecn.org/crypto/etere/ander.htm

RA96 «The Eternity Service,» by Ross J. Anderson, in Proceedings of Pragocrypt 96, http://www.cl.cam.ac.uk/users/rjal4/eternity/eternity.html

RB98 «And there are it nevertheless, the movement profiles,» by Niklaus Ramseyer and Denis Von Burg, SonntagsZeitung Online, July 12, 1998. English translation: http://jya. com/gsm scandal.htm

RC03 «Banned BBC film up for sale on internet,» by Rob Crilly, Glasgow Herald, 26 August 2003, http://www.theherald.co.uk/news/archive/26 8 19103 0 7 44.html

REOO «Pentagon launches 'smart card' ID – New badges will serve as passport to electronic world,» by Reuters, Oct. 11, 2000, http://www.nytimes.com/reuters/technology/tech smartcard pentag.html

RE02 «Microsoft says Windows 2000 passes security check, gets Level 4 Common Criteria OK», Reuters, October 30, 2002, http://www.usatoday.com/tech/news/ computer security/2002 10 30 windows secure_x.htm

RE03 «Microsoft Large Army Software Contract», Reuters, June 25, 2003. http://www.forbes.com/technology/newswire/2003/06/25/rtrl011470.html

RF03 «Michelin Embeds RFK» Tags in Tires,» RFID Journal News, Jan 17, 2003, http://www.rfidj ournal. com/article/articleview/269/1 /1 /

RH03 «On Election Day 2004, How Will You Know If Your Vote Is Properly Counted?  Answer: You Won't». Representative Rush Holt (Democrat, New Jersey). May 22, 2003, http://holt.house.gov/issues2.cfm?id=5996%20

RJ03 «Bad publicity, clashes trigger MS Palladium name change», The Register, 27 January 2003, http://www.theregister.co.uk/content/archive/29039.html

RL03 «VeriSign tapped to secure Internet voting» by Robert Lemos, CNETNews.com, 30 Sept 2003, http://news.com.com/2100 1029 5083772.html



Достарыңызбен бөлісу:
1   ...   8   9   10   11   12   13   14   15   16




©dereksiz.org 2024
әкімшілігінің қараңыз

    Басты бет