aboutsummaryrefslogtreecommitdiff
path: root/refer
diff options
context:
space:
mode:
Diffstat (limited to 'refer')
-rw-r--r--refer46
1 files changed, 33 insertions, 13 deletions
diff --git a/refer b/refer
index c8ab15c..e4e418c 100644
--- a/refer
+++ b/refer
@@ -74,16 +74,12 @@
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
-%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
-(Accessed 3rd January 2022)
%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
-%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
-(Accessed 3rd January 2022)
%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
@@ -114,23 +110,20 @@
%A Peter Baker
%D June 2013
%J The New York Times
-%O https://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
%T NSA collecting phone records of millions of Verizon customers daily
%A Glenn Greenwald
%D June 2013
%J The Guardian
-%O https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
%T Anger swells after NSA phone records court order revelations
%J The Guardian
%D June 2013
%A Dan Roberts
%A Spencer Ackerman
-%O https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
-- lawmaking
@@ -138,8 +131,7 @@
%J The Register
%D Feb 2022
%A Agam Shah
-%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/
-(Accessed 6th February 2022)
+%O Accessed online on 6th February 2022
%A H.R.3773
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
@@ -177,6 +169,12 @@
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
(Accessed 7th February 2022)
+%T One-time Pad
+%A Dirk Rijmenants
+%D date unknown
+%O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm
+(Accessed 26th February 2022)
+
-- quantum
%T Report on Post-Quantum Cryptography
@@ -219,7 +217,7 @@
%T Quantum computational advantage using photons
%A Han-Sen Zhong^et^al
%D 2020
-%G DOI: 10.1126/science.abe8770
+%O DOI: 10.1126/science.abe8770
%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
%J NPR
@@ -227,3 +225,25 @@
%A Paolo Zialcita
%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .
+
+%T The Hidden Truth Anonymity in Cyberspace: Deep Web
+%D 2018
+%A Saksham Gulati
+%A Shilpi Sharma
+%A Garima Agarwal
+%J Advances in Intelligent Systems and Computing
+%V 673
+%P 719–730
+%O DOI: 10.1007/978-981-10-7245-1_70
+
+%T China Cracks Down on Tor Anonymity Network
+%A David Talbot
+%D Oct 2009
+%J MIT Technology Review
+
+%T How China Is Blocking Tor
+%A Philipp Winter
+%A Stefan Lindskog
+%J Karlstad University
+%G arXiv:1204.0447 [cs.CR]
+%D Apr 2012