Next: About this document ...
Up: Detecting Hit Shaving in
Previous: Acknowledgments
- AM98
- V. Anupam and A. Mayer. Security of web browser
scripting languages: Vulnerabilities, attacks, and remedies. In
Proceedings of the 7th USENIX Security Symposium, January 1998.
- Fla98
- D. Flanagan. JavaScript: The Definitive
Guide. 3rd edition, O'Reilly & Associates, 1998.
- GGMM97
- E. Gabber, P. Gibbons, Y. Matias, and
A. Mayer. How to make personalized web browsing simple, secure, and
anonymous. In Proceedings of Financial Cryptography '97, 1997.
- Hal94
- N. M. Haller. The S/Key one-time
password system. In Proceedings of the Internet Society
Symposium on Network and Distributed Systems, 1994.
- Kle98
- D. Klein. Succumbing to the dark side of
the force: The Internet as seen from an adult web site. Invited talk
at the 1998 USENIX Annual Technical Conference, June 17, 1998.
- MK97
- C. Musciano and B. Kennedy. HTML: The
Definitive Guide. 2nd Edition, O'Reilly & Associates, 1997.
- RR98
- M. K. Reiter and A. D. Rubin. Crowds: Anonymous
web transactions. ACM Transactions on Information and System
Security 1(1), June 1998.
- RS95
- R. Rivest and A. Shamir. PayWord and MicroMint:
Two simple micropayment schemes. Manuscript, 1995.
- RSA78
- R. Rivest, A. Shamir, and L. Adleman. A method
for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM 21(2):120-126, February 1978.
- SHA95
- FIPS 180-1, Secure hash standard. Federal
Information Processing Standards Publication 180-1, U.S. Department of
Commerce/N.I.S.T., National Technical Information Service, April 17,
1995.
Mike Reiter
7/21/1998