REFERENCES
- Carley , W.M. 1992 . In-House Hackers: Rigging Computers for Fraud or Malice is Often an Inside Job . The Wall Street Journal , August 27
- Denning , D.E. and Lin , H. , eds. 1994 . Rights and Responsibilities of Participants in Networked Communities , Washington, DC : National Academy Press .
- Denning , D.E. and Smid , M. Key Escrowing Today . IEEE Communications , 3 ( 9 ) 58 – 68 .
- Denning , D.E. 1994 . “ Cryptography and Escrowed Encription ” . In Handbook of Information Security Management: 1994–95 Yearbook , Edited by: Ruthberg , Z.G. and Tipton , H.F. S – 217 . Auerbach . In
- Denning , D.E. 1982 . Cryptography and Data Security , Addison-Wesley .
- Denning , D.E. Data Encryption and Electronic Surveillance . SEARCH Technical Bulletin , (n.d.)
- Denning , P. , ed. 1990 . Computers Under Attack: Intruders, Worms and Viruses , ACM Press, Addison-Wesley .
- Elmer-Dewitt , P. 1994 . Terror on the Internet . Time , Dec. : 44 – 45 . 12
- Feb 1994 . “ Escrowed Encryption Standard (EES) ” . In Federal Information Processing Standards Publication (FIPS PUB) 185 , Feb , National Institute for Standards and Technology .
- Gary , L.D. presentation at National Computer Security Conference . Oct. 12 .
- Greiveldinger , G.R. 1994 . Digital Telephony and Key-Escrow Encryption Initiatives . Federal Bar News and Journal , 41 ( 7 ) : 505 – 510 .
- Jones , J. 1993 . Hacker Nurse Makes Unauthorised Changes to Prescriptions . RISKSFORUM Digest , 15 ( 37 ) reprinted from The Guardian, Dec. 21, 1993.
- Lang , M. 1994 . Computer Libel Wins Academic $40,000 . The West Australian , Apr. 2
- Meyer , M. and Underwood , A. 1994 . Crimes of the Net . Newsweek , Nov. 14
- Miller , B. 1994 . Ringleader Pleads Guilty in Phone Fraud . The Washington Post , Oct. 27
- Mills , M. 1994 . Cellular One Suspends a Service in N.Y. Area . The Washington Post , Nov. : C1 – C1 . 29
- Neumann , P.G. 1994 . Computer Related Risks , Addison-Wesley .
- Pfleeger , H.F. 1989 . Security in Computing , Prentice Hall .
- Ruthberg , Z.G. and Tipton , H.F. , eds. 1994 . Handbook of Information Security Management , Auerbach .
- Schneier , B. 1994 . Applied Cryptography , Wiley .
- Slade , R. 1994 . Computer Viruses , Springer-Verlag .
- Stoll , C. 1989 . The Cuckoo's Nest , Simon and Schuster .
- Worner , E. 1994 . Hacker Pleads Guilty to Fraud . United Press International Newswire , June 14