Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Refining UML interactions with underspecification and nondeterminism
Nordic Journal of Computing
Foundations and Trends in Information Retrieval
Toward a theory of network gatekeeping: A framework for exploring information control
Journal of the American Society for Information Science and Technology
Security programming using Python: man-in-the-middle attacks
Proceedings of the 4th annual conference on Information security curriculum development
Elliptic Curve Cryptography with the TI-83
Cryptologia
Designing web labs for teaching security concepts
Journal of Computing Sciences in Colleges
Facts and Myths of Enigma: breaking stereotypes
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Cautionary tales from real world failures for managing security in the cyber world
2010 Information Security Curriculum Development Conference
Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge
Nature inspired heuristics for attack of simplified DES algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
Hidden protocols: Modifying our expectations in an evolving world
Artificial Intelligence
Hi-index | 0.00 |
From the Publisher:Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history was altered by a few sheets of cryptic prose. This is just one link in humankind's evolutionary chain of secret communication, and just one of the fascinating incidents recounted in The Code Book, written by bestselling author Simon Singh.Combining a superb storyteller's sense of drama and a scientist's appreciation for technical perfection, Singh traces the evolution of secret writing from ancient Greek military espionage to the frontiers of computer science. The result is an epic tale of human ingenuity, with examples that range from the poignant to the peculiar to the world-historical.There is the case of the Beale ciphers, which involves Wild West escapades, a cowboy who amassed a vast fortune, a buried treasure worth $20 million, and a mysterious set of encrypted papers describing its whereaboutspapers that have baffled generations of cryptanalysts and captivated hundreds of treasure hunters.A speedier end to a bloody war was the only reward that could be promised to the Allied code breakers of World Wars I and II, whose selfless contributions altered the course of history; but few of them lived to receive any credit for their top-secret accomplishments. Among the most moving of these stories is that of the World War II British code breaker Alan Turing, who gave up a brilliant career in mathematics todevote himself to the Allied cause, only to end his years punished by the state for his homosexuality, while his heroism was ignored. No less heroic were the Navajo code talkers, who volunteered without hesitation to risk their lives for the Allied forces in the Japanese theater, where they were routinely mistaken for the enemy.Interspersed with these gripping stories are clear mathematical, linguistic, and technological demonstrations of codes, as well as illustrations of the remarkable personalitiesmany courageous, some villainous, and all obsessivewho wrote and broke them.All roads lead to the present day, in which the possibility of a truly unbreakable code looms large. Singh explores this possibility, and the ramifications of our increasing need for privacy, even as it begins to chafe against the stated mission of the powerful and deeply secretive National Security Agency. Entertaining, compelling, and remarkably far-reaching, this is a book that will forever alter your view of history, what drives it, and how private that e-mail you just sent really is.Included in the book is a worldwide Cipher Challengea $15,000 award will be given by the author to the first reader who cracks the code successfully. Progress toward the solution will be tracked on The Code Book website.