forked from Sravan2j/SJSU-thesis-LaTeX
-
Notifications
You must be signed in to change notification settings - Fork 15
/
Copy pathreferences.bib
122 lines (108 loc) · 3.35 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
@misc{calderwood,
place={New York, New York},
title={Crossing Over with John Edward},
journal={Crossing Over with John Edward},
publisher={Sci-Fi Channel},
author={Calderwood, Dana},
year={2000}, month={Jan}
}
@Book{fitzpatrick2003cat,
author = {Fitzpatrick, Sonya},
title = {Cat talk : the secrets of communicating with your cat},
publisher = {Berkley Books},
year = {2003},
address = {New York},
isbn = {0425194957}
}
@Book{fitzpatrick_smith_1997,
place={New York},
title={What the animals tell me: developing your innate telepathic skills to understand and communicate with your pets},
publisher={Hyperion},
author={Fitzpatrick, Sonya and Smith, Patricia Burkhart},
year={1997}
}
@misc{fitzpatrick_2013,
title={About Sonya Fitzpatrick},
url={http://sonyafitzpatrick.com/about/},
journal={Sonya Fitzpatrick}, publisher={Animals Are Forever LLC},
author={Fitzpatrick, Sonya}, year={2013}
}
@article{harden,
author = {Peter Adams},
title = {A `murder code' broken},
journal = {San Francisco Chronicle},
year = {1969},
month = {aug}
}
@misc{bib1,
author = {National Institute of Science and Technology},
title = {Announcing the Advanced Encryption Standard (AES)},
howpublished = {\url{http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf}},
year = {2001},
note = {(Accessed on 10/30/2005)}
}
@mastersthesis{basa,
author = {P. K. Basavaraju},
title = {Heuristic-search cryptanalysis of the Zodiac~340 cipher},
school = {San Jose State University},
year = 2009,
}
@misc{bib3,
author = {K. Briggs},
title = {English and Latin digram and trigram frequencies},
howpublished = {\url{http://keithbriggs.info/documents/english_latin.pdf}},
month = {},
year = {2013},
note = {(Accessed on 07/28/2014)}
}
@misc{bib2,
author = {G. Claston},
title = {340-cipher --- overview and examination},
howpublished = {\url{http://www.zodiackiller.com/mba/zc/69.html}},
month = {},
year = {2008},
note = {(Accessed on 12/21/2010)}
}
@misc{glurk,
author = {Glurk},
title = {The final~18 symbols are nothing but filler!},
howpublished = {\url{http://www.zodiackillerfacts.com/forum/viewtopic.php?f=49&t=423}},
month = {},
year = {2005},
note = {(Accessed on 05/01/2016)}
}
@article{bib7,
author = {T. Jakobsen},
title = {A fast method for the cryptanalysis of substitution ciphers},
journal = {Cryptologia},
year = {1995},
pages = {265-274},
volume = {19}
}
@book{bib10,
author = {D. Kreher and D. Stinson},
year = {1998},
publisher = {CRC~Press},
title = {Combinatorial Algorithms: Generation, Enumeration and Search}
}
@article{bib11,
author = {G. Shanmugam and R. M. Low and M. Stamp},
title = {Simple substitution distance and metamorphic detection},
journal = {Journal of Computer Virology and Hacking Techniques},
year = {2013},
number = {3},
pages = {159-170},
volume = {9}
}
@book{bibAC,
author = {M. Stamp and R. M. Low},
year = {2006},
publisher = {Wiley},
title = {Applied Cryptanalysis: Breaking Ciphers in the Real World}
}
@book{bib17,
author = {M. Stamp},
year = {2011},
title = {Information Security: Principles and Practice},
publisher = {Wiley},
}