[SCHNEI 96] |
Bruce Schneider: |
Applied Cryptography (Protocols, Algorithms and Source Code in C) printed
in the USA, 1996. |
|
[SCHNEI 00] |
Bruce Schneider: |
Secret and Lies (Digital Security in a Networked World) printed
in the USA, 2000. |
|
[SCHN 95] |
Bruce Schneier: |
e-mail security How to Keep Your Electronic Messages
Private Johns
Wiley and Sons, Inc. New York, 1995. |
|
[SCHU 91] |
R. H. Schulz: |
Kodierungtheorie: eine Einführung Vieweg
Verlag, Braunschweig, Wiesbaden, 1991. |
|
[SCHW 81] |
. Schwarz: |
The role of semigroups in the
elementary theory of numbers. Math
Slovacal 31 (1981) 369-395 |
|
[SEARS 86] |
Peter Sears: |
Secret Writing New
York, Teachers & Writers Collaborative, 1986. |
|
[SEBER 89] |
Jennifer Seberry and Joseph Pieprzyk: |
Cryptography: An Introduction to
Computer Security New York, Prentice-Hall, 1989. |
|
[[SHAMI
01] |
Adi Shamir: |
Factoring Large
Numbers with TWINKLE Device |
|
[[SHANN 48] |
C.E.Shannon: |
The Mathematical Theory of
Communication Bell
System Technical Journal, 1948. July and October |
|
[[SHANN 49] |
C.E.Shannon: |
Communication
Theory of Secrecy Systems Bell System Technical Journal 28 (1949) 656-715. |
|
|
[SHANN 51] |
C.E.Shannon: |
Prediction
and entropy of printed English
Bell System
Technical Journal, 1951. January |
|
[SHANN 62] |
Claude E.Shannon and Warren Weaver: |
The
Mathematical Theory of Communication
Urban: University of
Illionis Press, 1962. |
|
[SIMM 79] |
G. J. Simmons: |
Cryptology:
The Mathematics of Secure Communications
The Mathematical
Intelligencer 1 (1979) 233-246. |
|
[SIMM 82] |
Gustavus J.Simmons: |
Secure
Communications and Asymmetric Cryptosystems Boulder, Westview
Press, 1982. |
|
[SIMM
91/1] |
G. J. Simmons (ed): |
Contemporary
Cryptology
IEEE Press, New
York, 1991 |
|
[SIMM
91/2] |
G. J. Simmons: |
Identification
of data, devices, documents and individuals
Proc 25th
Annual IEEE Carnahan Conf. On Security Technology 1991, IEEE, New York, pp.
197-218. |
|
[SINGH 00] |
Simon Singh: |
The science of secrecy (The secret history of codes and codebreaking) Fourth Estate, London,
2000. Magyar kiadás:
Kódkönyv (A rejtjelezés és rejtjelfejtés
története) Park Könyvkiadó, 2001, 2002 |
|
[SINK 66] |
Abraham Sinkov: |
Elementary
Cryptanalysis
Mathematical
Association of America, Washington, 1966. |
|
[SINK 68] |
Abraham Sinkov: |
Elementary
Cryptanalysis: A Mathematical Approach
New York, Random House,
1968. |
|
[SLAD 98] |
R. Slade: |
Guide
to Computer Viruses
Springer Verlag. 1998. |
|
[SLAT 91] |
K. Slater: |
Information
Security in Financial Services
Stockton Press, 1991. |
|
[SMITH 43] |
Laurence Dwight Smith: |
Cryptography:
The Science of Secret Writing
New York,
W.W.Norton, 1943. |
|
[SMI 98] |
Michael Smith: |
Station X The Codebreakers of Bletchley Park Chanel 4 Books,
Macmillan Publishers Ltd., London, 1998. |
|
[SOLO 92] |
A. Solomon: |
The Virus Authors Strike back. Computers&Security 11 (1992) 602-606. |
|
[STALL 95] |
William Stallings: |
Network and Internetwork Security: Principles and Practices Englewood Cliffs,
Prentice-Hall, 1995. |
|
[STEW 96] |
Ian Stewart: |
Proof of Purchase on the Internet: Zero-knowledge Protocols Scientific American, February 1996., 124-125
|
|
[SVÉK 64] |
Svékus Olivér: |
Titkosírások
Móra Ferenc
Könyvkiadó, Budapest, 1964 |
[[SZAN 97] |
Dr. Szandtner Károly Dr. Kovács Károly: |
Épület-informatika
Budapesti Műszaki Egyetem, 1997. |
|
[[SZIK 83] |
Szikora András: |
Katonagalambok,
hírvivő galambok
Zrínyi Katonai Kiadó, Budapest, 1983. |
|