50
Views
0
CrossRef citations to date
0
Altmetric
Articles

Crime and crypto on the information superhighway

Pages 323-336 | Published online: 18 Aug 2006

REFERENCES

  • Carley , W.M. 1992 . In-House Hackers: Rigging Computers for Fraud or Malice is Often an Inside Job . The Wall Street Journal , August 27
  • Denning , D.E. and Lin , H. , eds. 1994 . Rights and Responsibilities of Participants in Networked Communities , Washington, DC : National Academy Press .
  • Denning , D.E. and Smid , M. Key Escrowing Today . IEEE Communications , 3 ( 9 ) 58 – 68 .
  • Denning , D.E. 1994 . “ Cryptography and Escrowed Encription ” . In Handbook of Information Security Management: 1994–95 Yearbook , Edited by: Ruthberg , Z.G. and Tipton , H.F. S – 217 . Auerbach . In
  • Denning , D.E. 1982 . Cryptography and Data Security , Addison-Wesley .
  • Denning , D.E. Data Encryption and Electronic Surveillance . SEARCH Technical Bulletin , (n.d.)
  • Denning , P. , ed. 1990 . Computers Under Attack: Intruders, Worms and Viruses , ACM Press, Addison-Wesley .
  • Elmer-Dewitt , P. 1994 . Terror on the Internet . Time , Dec. : 44 – 45 . 12
  • Feb 1994 . “ Escrowed Encryption Standard (EES) ” . In Federal Information Processing Standards Publication (FIPS PUB) 185 , Feb , National Institute for Standards and Technology .
  • Gary , L.D. presentation at National Computer Security Conference . Oct. 12 .
  • Greiveldinger , G.R. 1994 . Digital Telephony and Key-Escrow Encryption Initiatives . Federal Bar News and Journal , 41 ( 7 ) : 505 – 510 .
  • Jones , J. 1993 . Hacker Nurse Makes Unauthorised Changes to Prescriptions . RISKSFORUM Digest , 15 ( 37 ) reprinted from The Guardian, Dec. 21, 1993.
  • Lang , M. 1994 . Computer Libel Wins Academic $40,000 . The West Australian , Apr. 2
  • Meyer , M. and Underwood , A. 1994 . Crimes of the Net . Newsweek , Nov. 14
  • Miller , B. 1994 . Ringleader Pleads Guilty in Phone Fraud . The Washington Post , Oct. 27
  • Mills , M. 1994 . Cellular One Suspends a Service in N.Y. Area . The Washington Post , Nov. : C1 – C1 . 29
  • Neumann , P.G. 1994 . Computer Related Risks , Addison-Wesley .
  • Pfleeger , H.F. 1989 . Security in Computing , Prentice Hall .
  • Ruthberg , Z.G. and Tipton , H.F. , eds. 1994 . Handbook of Information Security Management , Auerbach .
  • Schneier , B. 1994 . Applied Cryptography , Wiley .
  • Slade , R. 1994 . Computer Viruses , Springer-Verlag .
  • Stoll , C. 1989 . The Cuckoo's Nest , Simon and Schuster .
  • Worner , E. 1994 . Hacker Pleads Guilty to Fraud . United Press International Newswire , June 14

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.