Networks without user observability
- 30 April 1987
- journal article
- Published by Elsevier in Computers & Security
- Vol. 6 (2) , 158-166
- https://doi.org/10.1016/0167-4048(87)90087-3
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security, 1985
- A Metropolitan Area NetworkIEEE Journal on Selected Areas in Communications, 1985
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- Thwarting the information thieves: Fear of spying through simple or sophisticated electronics has spawned an industry whose challenge is to block the illegal interception of intelligenceIEEE Spectrum, 1985
- Reflections on trusting trustCommunications of the ACM, 1984
- Key exchange using ‘keyless cryptography’Information Processing Letters, 1983
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- How to share a secretCommunications of the ACM, 1979
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949