history.bib

@article{bellovin:further,
  abstract = {New information has been discovered about Frank Miller's
		  1882 one-time pad. These documents explain Miller's threat
		  model and show that he had a reasonably deep understanding
		  of the problem; they also suggest that his scheme was used
		  more than had been supposed.},
  author = {Steven M. Bellovin},
  date-added = {2017-01-02 22:08:42 +0000},
  date-modified = {2017-01-02 22:09:39 +0000},
  journal = {Cryptologia},
  note = {To appear},
  title = {Further Information on {Miller's} 1882 One-Time Pad},
  year = {2017},
  bdsk-url-1 = {https://mice.cs.columbia.edu/getTechreport.php?techreportID=1626}
}
@incollection{bellovin:vernam--mauborgne--and-friedman,
  author = {Steven M. Bellovin},
  booktitle = {The New Codebreakers: Essays Dedicated to {David Kahn} on
		  the Occasion of His 85th Birthday},
  date-added = {2016-04-05 01:58:08 +0000},
  date-modified = {2016-04-05 02:00:35 +0000},
  editor = {Peter Y. A. Ryan and David Naccache and Jean-Jacques
		  Quisquater},
  publisher = {Springer},
  title = {{Vernam, Mauborgne, and Friedman}: The One-Time Pad and
		  the Index of Coincidence},
  year = {2016}
}
@article{bellovin:mysterious,
  abstract = {It has long been known that George Fabyan's Riverbank
		  Laboratories provided the U.S. military with cryptanalytic
		  and training services during World War~I. The relationship
		  has always be seen as voluntary. Newly discovered evidence
		  raises the question of whether Fabyan was in fact paid, at
		  least in part, for his services, but available records do
		  not provide a definitive answer. },
  author = {Steven M. Bellovin},
  date-modified = {2017-01-12 22:10:31 +0000},
  journal = {Cryptologia},
  note = {To appear},
  title = {Mysterious Checks from {Mauborgne} to {Fabyan}},
  year = {2017}
}
@article{bellovin:frank-miller,
  abstract = {The invention of the one-time pad is generally credited to
		  Gilbert S. Vernam and Joseph O. Mauborgne. We show that it
		  was invented about 35 years earlier by a Sacramento banker
		  named Frank Miller. We provide a tentative identification
		  of which Frank Miller it was, and speculate on whether or
		  not Mauborgne might have known of Miller's work, especially
		  via his colleague Parker Hitt.},
  author = {Steven M. Bellovin},
  institution = {Department of Computer Science, Columbia University},
  journal = {Cryptologia},
  month = {July},
  note = {An earlier version is available as technical report
		  CUCS-009-11},
  number = {3},
  pages = {203--222},
  title = {{Frank Miller}: Inventor of the One-Time Pad},
  url = {http://dx.doi.org/10.1080/01611194.2011.583711},
  volume = {35},
  year = {2011},
  bdsk-url-1 = {http://dx.doi.org/10.1080/01611194.2011.583711}
}
@article{bellovin:by,
  abstract = {Amidst the many public discussions springing from the
		  Edward Snowden documents, one has been about the perceived
		  change in the NSA's practices: they're now hacking
		  computers instead of tapping wires and listening to radio
		  signals. Looked at narrowly---that is, in terms of only
		  NSA's mission---that may be true. Looked at more broadly,
		  in terms of how intelligence agencies have always behaved,
		  this is no surprise at all. They've long used only two
		  criteria when evaluating a proposed tactic: does it work,
		  and at what cost?},
  author = {Steven M. Bellovin},
  date = {2014-07/2014-08},
  date-added = {2014-07-21 03:20:37 +0000},
  date-modified = {2014-08-14 02:45:56 +0000},
  journal = {{IEEE} Security \& Privacy},
  month = {July--August},
  number = {4},
  title = {By Any Means Possible: How Intelligence Agencies Have
		  Gotten Their Data},
  url = {https://www.cs.columbia.edu/~smb/papers/possible.pdf},
  volume = {12},
  year = {2014},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/possible.pdf}
}