Basic Concepts and Historical Overview
暂无分享,去创建一个
[1] J. Weizenbaum. From Computer Power and Human Reason From Judgment to Calculation , 2007 .
[2] Marian Rejewski,et al. How Polish Mathematicians Broke the Enigma Cipher , 1981, Annals of the History of Computing.
[3] Andrew Hodges,et al. Alan Turing: The Enigma , 1983 .
[4] A. Miller. The assault on privacy : computers, data banks, and dossiers , 1972 .
[5] T. Forester,et al. Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .
[6] Simon Singh,et al. Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2003, ACM Queue.
[7] Ralph Erskine. The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry , 2006, Cryptologia.
[8] Judith A. Perrolle,et al. Computers and social change: information, property, and power , 1987 .
[9] M. Rejewski. How Polish Mathematicians Deciphered the Enigma , 1981 .
[10] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Steven Levy,et al. Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age , 2001 .
[13] Manindra Agrawal,et al. PRIMES is in P , 2004 .
[14] Jean Stengers. Enigma, the French, the Poles and the British 1931 -1940 , 2004 .
[15] Eugene H. Spafford,et al. Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats , 1989 .
[16] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..