References
- Denning and Dorothy , E. 1982 . “ Purdue University ” . In Cryptography and Data Security , Addison-Wesley Pub. Co .
- Meade G. George Fort Trusted Computer System Evaluation Criteria Maryland 1983 20755
- Gifford and David , K. 1982 . Cryptographic sealing for information secrecy and authentication . Comm. ACM , 25 ( 4 ) : 274 – 286 .
- Gudes and Ehud . 1980 . The design of a cryptography based secure file system . IEEE Trans, on Software Engineering , SE6 ( 5 )
- Kronsjo and Lydia , I. 1979 . Algorithms: Their Complexity and Efficiency , John Wiley and Sons .
- Mignotte , M. 1982 . Proceedings of the Workshop on Cryptography . How to share a secret . 1982 , Germany. Lecture Notes in Computer Science149, Cryptography
- 1962 . Lisp 1.5 Programmer's Manual , Cambridge, MA : MIT Press .
- Mignotte M. Data Encryption Standard, National Bureau of Standards, Federal Information Processing Standards 1977 46
- Rivest , Ronald , L. , Shamir , Adi and Adleman , L. 1978 . A method for obtaining digital signatures and public key cryptosystems . Comm. ACM , 21 ( 2 ) : 120 – 126 .
- Saltzer , J. H. 1974 . Protection and the control of information sharing in Multics . Comm. ACM , 17 ( 7 ) : 388 – 402 .
- Shamir and Adi . 1979 . How to share a secret . Comm. ACM , 22 ( 11 ) : 612 – 613 .