next up previous
Next: About this document Up: The Eternity Service Previous: Acknowledgements

References

Ald95
``Nurse sacked for altering records after baby's death'', K Alderson, The Times 29 November 95 p 6

Amo94
`Fundamentals of Computer Security Technology', E Amoroso, Prentice Hall 1994

And94
``Why Cryptosystems Fail'' in Communications of the ACM vol 37 no 11 (November 1994) pp 32-40

AN95
RJ Anderson, RM Needham, ``Programming Satan's Computer'', in `Computer Science Today -- Recent Trends and Developments', J van Leeuven (ed.), Springer Lecture Notes in Computer Science volume 1000 pp 426-440

Bur96
``Rising from the Rubble'', G Burton, in Computer Weekly (29 Feb 1996) p 20

BFL+93
S Blythe, B Fraboni, S Lall, H Ahmed, U de Riu, ``Layout Reconstruction of Complex Silicon Chips'', in IEEE J. of Solid-State Circuits v 28 no 2 (Feb 93) pp 138-145

Cha81
D Chaum, ``Untraceable electronic mail, return addresses, and digital pseudonyms'', in Communications of the ACM v 24 no 2 (Feb 1981) pp 84-88

Cha88
D Chaum, ``The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability'', in Journal of Cryptology v 1 (1988) pp 65-75

IBM93
`Up the creek? -- The business perils of computer failure', IBM, 1993

JDK+91
DB Johnson, GM Dolan, MJ Kelly, AV Le, SM Matyas, ``Common Cryptographic Architecture Application Programming Interface'', in IBM Systems Journal 30 no 2 (1991) pp 130 - 150

Nee94
RM Needham, ``Denial of Service: an Example'', in Communications of the ACM v 37 no 11 (Nov 94) pp 42-46

Rei94
MK Reiter, ``Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart'', in Proc. ACM Conf. on Computer and Communications Security 1994 pp 68-80

Rot95
J Rothenberg, ``Ensuring the Longevity of Digital Documents'', in Scientific American (January 1995) pp 24-29

VN94
BR Venkataraman, RE Newman-Wolfe, ``Performance Analysis of a Method for High Level Prevention of Traffic Analysis Using Measurements from a Campus Network'', in Computer Security Applications 94 pp 288-297

Won94
K Wong, ``Business Continuity Planning'', in Computer Fraud and Security Bulletin (April 94) pp 10 - 16


Ross Anderson
Tue Jun 17 15:08:09 BST 1997