Useful References
The Carleton library has a lot of material under category QA76.9. Articles
on Security are published in several journals and conference proceedings.
The most important ones include
-
NETWORKS
-
CRYPTOGRAPHY AND SECURITY
-
Computer System and Network Security
-
M. Bishop, Computer Security: Art and Science (Addison-Wesley, 2002).
ISBN: 0-201-44099-7
-
U. Black, Internet Security Protocols, Prentice Hall, 2000,
ISBN: 0-13-014249-2
-
L. Jean Camp, Trust and Risk in Internet Commerce, MIT Press, 2001.
-
D. W. Davies and W. L. Price, Security for Computer Networks, John Wiley
and Sons, 2nd edition, 1988.
-
A. Perrig, J. D. Tygar,
Secure Broadcast Communication in Wired and Wireless Networks,
Kluwer Academic Publishers, 2003.
ISBN: 0-7923-7650-1
-
Pfleeger and Pfleeger, Security in Computing,
third edition (Prentice Hall, 2002).
-
Man Young Rhee, CDMA Cellular Mobile Communication
Network Security, Prentice Hall, 1998.
ISBN: 0-13598418-1
-
A. Rubin, D. Geer, and M. Ranum,
WEB
Security Sourcebook, John Wiley and Sons, 1997.
-
W. Stallings, NETWORK SECURITY ESSENTIALS: Applications and Standards,
Prentice Hall, 1999, ISBN 0-13-016013-08.
-
W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY: Principles and
Practice, Prentice Hall, 1888, ISBN
0-13-86-9017-0.
-
Cryptography
-
E. Biham and A. Shamir,
Differential Cryptanalysis of DES, Springer Verlag, 1993.
-
Brands, S., Rethinking Public Key Infrastructures and
Digital Certificates: Building in Privacy, MIT Press, 2000,
ISBN 0-262-02491-8.
-
J. Daemen, V. Rijmen,
The Design of Rijndel: AES-The Advanced Encryption Standard,
Springer, ISBN 3-540-42580-2
-
H. Delfs, H. Knebl,
Introduction to Cryptography: Priciples and Applications,
Springer Verlag, 2002.
-
A. J. Menezes, P. C. van Oorchoot, and S. A. Vanstone,
Hanbook of Applied Cryptology CRC Press, 1996
-
C. H. Meyer and S. M. Matyas, Cryptography: A New Dimension in Computer
Security, John Wiley and Sons, 1982.
-
A. Salomaa, Public-Key Cryptography, EATCS Monographs, Springer Verlag,
1990.
-
B. Schneier, Applied
Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley
and Sons, 2nd Rev edition, 1996.
-
D. Stinson,
CRYPTOGRAPHY: Theory and Practice,
CRC Press Inc., 1885, ISBN 0-8493-8521-0
-
General/Applications
-
J. Ashbourn, Biometrics: Advanced Identity Verification,
Springer, 2000, ISBN: 1-85233-243-3.
-
W. Rankl and W. Effing, Smartcard Handbook, John Wiley and Sons,
1997 (translated from the German).
-
Contemporary Cryptology: The Science of Information Integrity,
G. J. Simmons, ed., IEEE Press, 1992.
-
Information Security: An Integrated Collection of Essays,
IEEE Press, 1995.
-
General/Historical Interest
-
Aegean Park Press
-
W. Diffie, and S. Landeau, Privacy on the Line: The Politics of Wiretapping
and Encryption, MIT Press, 1998.
-
F. L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology, Springer
Verlag, 1997. This publisher has numerous classical books on Cryptology,
intelligence, and Security
-
P. Himanen,
The Hacker Ethic,
Random Haouse, New York, 2001.
ISBN: 0-375-50566-0
-
D. Kahn, The Codebreakers, Macmillan, New York, 1967.
-
B. Schneier,
Secrets and Lies: Digital Security in a Networked World,
John Wiley and Sons, 2000,
ISBN: 0471253111
-
S. Singh, The Code Book, Doubleday, 1999.
-
A. Sinkov,
Elementary Cryptanalysis: A Mathematical Approach,
MAA, New Mathematical Library, Vol 22, 1966,
ISBN: 0-88385-622-0
-
The history of Non-Secret Encryption
-
The Alan Turing Home Page
-
NUMBER THEORY
-
Electronic Links
-
Specialized
-
S. Lang, Elliptic Functions, 2nd edition, Springer Verlag, 1986
-
J. H. Silverman, The Arithmetic of Elliptic Curves, Springer Verlag, 1986.
-
Elementary
-
W. J. LeVeque, Elementary Theory of Numbers, Addison-Wesley, 1962.
-
I. M. Vinogradov, Elements of Number Theory, Dover, 1954.
-
Andre Weil, Number Theory for Beginners, Springer Verlag, 1979.
-
Classical
-
K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory,
Springer Verlag, 1990, 2nd edition,
-
W. Sierpinski, Elementary Theory of Numbers, North-Holland, PWN-Polish
Scientific Publishers, 1988.
-
Computational
-
E. Bach and J. Shallit, Algorithmic Number Theory, Vol. 1: Efficient Algorithms,
MIT Press, 1996.
-
D. M. Bressoud, Factorization and Primality Testing, Springer Verlag, 1989.
-
H. Cohen, A Course in Computational Number Theory, Springer Verlag, 1995.
-
N. Koblitz, A Course in Elementary Number Theory and Cryptography, Springer
Verlag, 1987.
-
E. Kranakis, Primality and Cryptography, Wiley-Teubner, 1986.
-
M. Pohst and H. Zassenhaus,
Algorithmic Algebraic Number Theory,
Cambridge University Press, 1989.
-
D. Shanks, Solved and Unsolved Problems in Number Theory, Chelsea, 1976.
-
ALGEBRA AND GROUP THEORY
-
Classical
-
M. H. Hall, The Theory of Groups, Chelsea Publ. Co., 1976.
-
J. J. Rotman, The Theory of Groups: An Introduction, Allyn and Bacon, Boston,
3rd edition, 1984.
-
B. L. van der Waerden, Algebra, Two Volumes, Frederick Ungar Publishing
Co, New York 1970.
-
Elementary
-
M. A. Armstrong, Groups and Symmetry, Springer Verlag, 1988.
-
C. R. Hadlock, Field Theory and Its Classical Problems, The Carus Mathematical
Monographs, Vol. 19, MAA, 1978.
- ELECTRONIC POINTERS
-
An Extensive searchable bibliography on Networks.
-
Bibliography in Computer Science.
-
Index of Cryptography Papers Available Online:
-
CASIS: Canadian Association for Security and Information Studies
-
Alta Vista Link to Cryptography.
-
Cryptography Courses
-
eCOMPANY: Security Technology
-
Cryptography Resources
-
An Extensive searchable bibliography on Networks,
Cryptography and Security Sources
-
Electronic Commerce
-
ICAR
-
List of Free Cryptolibraries
-
SunSITE
-
NIST
-
The Security Portal for Information System Security Professionals
-
Security Focus
-
Security Portal
-
DoS Attack Resources
-
SANS Institute
-
Packet Storm
-
Internet Security Systems
-
CONFERENCES IN NETWORK SECURITY
-
ACM Conference on Computer and Communication Security (CCS)
-
Network and Distributed System Security Symposium (NDSS).
-
USENIX
-
CONFERENCES
-
CRYPTO, EUROCRYPT, ASIACRYPT, AUSCRYPT (Springer Verlag Proceedings)
-
ESA: European Symposium on Algorithms
-
FOCS: IEEE Symposium
on Foundations of Computer Science
-
ICALP: International Colloquium on Automata Languages and Programming
-
SODA: Symposium on Discrete
Algorithms
-
STACS: Symposium on Theory and Aplications of Computer Science
-
STOC: ACM Symposium
on Theory of Computing
-
JOURNALS
-
Cryptologia
-
Designs, Codes,
and Cryptography
-
IEEE Transactions on Computers, Information
Theory, Networks, etc
-
Information and Computation
-
Journal of the ACM
-
Journal of Computer Security
-
Journal of Cryptology
-
Proceedings of the IEEE
-
SIAM Journal on
Computing
-
Special Issues
-
Network Security, IEEE Computer, Vol 31, Number 8, Sepyember 1998.
-
How Hackers Break In, Scientific American, October, 1998.