Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Detecting Hit Shaving in Previous: Acknowledgments

References

AM98
V. Anupam and A. Mayer. Security of web browser scripting languages: Vulnerabilities, attacks, and remedies. In Proceedings of the 7th USENIX Security Symposium, January 1998.

Fla98
D. Flanagan. JavaScript: The Definitive Guide. 3rd edition, O'Reilly & Associates, 1998.

GGMM97
E. Gabber, P. Gibbons, Y. Matias, and A. Mayer. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography '97, 1997.

Hal94
N. M. Haller. The S/Key$^{\rm TM}$ one-time password system. In Proceedings of the Internet Society Symposium on Network and Distributed Systems, 1994.

Kle98
D. Klein. Succumbing to the dark side of the force: The Internet as seen from an adult web site. Invited talk at the 1998 USENIX Annual Technical Conference, June 17, 1998.

MK97
C. Musciano and B. Kennedy. HTML: The Definitive Guide. 2nd Edition, O'Reilly & Associates, 1997.

RR98
M. K. Reiter and A. D. Rubin. Crowds: Anonymous web transactions. ACM Transactions on Information and System Security 1(1), June 1998.

RS95
R. Rivest and A. Shamir. PayWord and MicroMint: Two simple micropayment schemes. Manuscript, 1995.

RSA78
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, February 1978.

SHA95
FIPS 180-1, Secure hash standard. Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, April 17, 1995.



Mike Reiter
7/21/1998