Handouts
This folder contains additional handouts.
R. Coates, "The Law," from
The World of Mathematics
, J. Newman
ed
., Simon and Schuster, New York, NY (1956) pp. 2268–2271.
Please contact the instructor for a copy.
P. Festa, "The Root of the Problem: Bad Software," C|Net News.Com (Nov. 28, 2001).
If the above link does not work for you, please contact the instructor for a copy.
B. Miller, L. Fredriksen, and B, So, "An Empirical Study of the Reliability of UNIX Utilities,"
Communications of the CACM
33
(12) pp. 32-44 (Dec. 1990).
If the above link does not work for you, please contact the instructor for a copy.
Vigenère tableau
C. Ellison, "Cryptography Timeline" (Dec. 11, 2004).
D. Libes, "Choosing a Name for Your Computer," RFC 1178 (FYI 5) (Aug. 1990).
J. Haskett, "Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms,"
Communications of the CACM
27
(8) pp. 777-781 (Aug. 1984).
If the above link does not work for you, please contact the instructor for a copy.
Breaking a Vigenère Cipher
The One Time Password System S/Key
K. Thompson, "Reflections on Trusting Trust,"
Communications of the ACM
27
(8) pp. 761-763 (Aug. 1984).
If the above link does not work for you, please contact the instructor for a copy.
M. Bishop, "Analysis of the 'I LOVE YOU' Worm" (May 2000).
"FBI Alerts Public to Recent E-Mail Scheme," Federal Bureau of Investigation, Department of Justice (Nov. 21, 2005).
"Spam Scams," OnGuard Online.
Ken Olthoff, "System Admonishments" (2002).
ECS 155, Computer Security for Non-Majors
Fall Quarter 2005