24: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: ==Footnote 24== See generally Ford, supra note 16, at 75-84. Computer Communications Security 75-84 (1994); Kaufman, et al., Network Security, supra note 22, at 101-27; Nechvatal, Public K...)
 
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
(One intermediate revision by one other user not shown)
(No difference)

Latest revision as of 12:40, 16 October 2014

Footnote 24

See generally Ford, supra note 16, at 75-84. Computer Communications Security 75-84 (1994); Kaufman, et al., Network Security, supra note 22, at 101-27; Nechvatal, Public Key Cryptography, in Comtemporary Crypt ology: The Science of Information Integrity 179, 199-202 (Gustavas Simmons ed. 1991); Schneier, supra note 18, §§ 18.1-18.14, 429-459.