In lieu of an abstract, here is a brief excerpt of the content:

Bibliography Adida, Ben, and Ronald L. Rivest. “Scratch and Vote: Self-Contained Paper-Based Cryptographic Voting.” In Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, ed. Ben Adida and Ronald L. Rivest, 29–40. New York: ACM, 2006. Adleman, Leonard M. “Computing with DNA.” Scientific American 279, no. 8 (August 1998): 34–41. Agrawal, Dakshi, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. “The EM Side-Channel (S).” In Cryptographic Hardware and Embedded Systems—CHES 2002, ed. Burton S. Kaliski, 29–45. Berlin: Springer, 2003. Agre, Philip E. Computation and Human Experience. Cambridge: Cambridge University Press, 1997. Agre, Philip E. “Toward a Critical Technical Practice: Lessons Learned in Trying to Reform AI.” In Social Science, Technical Systems, and Cooperative Work: Beyond the Great Divide, ed. Geof Bowker, Les Gasser, Leigh Star, and Bill Turner, 131–157. Hillsdale, NJ: Lawrence Erlbaum Associates, 1997. Agre, Philip E. “Conceptions of the User in Computer Systems Design.” In Social and Interactional Dimensions of Human-Computer Interfaces, ed. Peter J. Thomas, 67– 106. Cambridge: Cambridge University Press, 1995. Alder, Ken. The Lie Detectors: The History of an American Obsession. New York: Free Press, 2007. Alder, Ken. “Reading Characters: French Handwriting Experts from the CounterReformation to the Dreyfus Affair.” Paper presented at the Berlin Summer Academy on Law, Science, and Technology, Max-Planck-Institut für Wissenschaftsgeschichte, Berlin, August 16–27, 1999. American Bar Association. “Digital Signature Guidelines: Legal Infrastructure for Certification Authorities and Secure Electronic Commerce.” Chicago: American Bar Association, August 1, 1996. 234 Bibliography Anderson, Ross J., Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Vaclav Matyas, and Fabien Petitcolas. The Global Internet Trust Register. Cambridge, MA: MIT Press, 1999. Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed. New York: Wiley, 2008. Anderson, Ross J. “Why Cryptosystems Fail.” Communications of the ACM 37, no. 11 (1994): 32–40. Anderson, Ross J., and Markus Kuhn. “Tamper Resistance: A Cautionary Note.” In Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, CA, November 18–20, 1996. Aronson, Jay D. Genetic Witness: Science, Law, and Controversy in the Making of DNA Profiling. New Brunswick: Rutgers University Press, 2007. Atkins, Derek, Michael Graff, Arjen Lenstra, and Paul Leyland. “The Magic Words Are Squeamish Ossifrage.” In Advances in Cryptology—ASIACRYPT ’94, ed. Josef Pieprzyk and Reihanah Safavi-Naini, 261–277. Berlin: Springer, 1994. Aynés, Laurent, and Phillipe Malaurie. “Formalités et preuve.” In Cours de droit civil: Les obligations. Paris: Éditions Cujas, 1990. Bailer-Jones, Daniela M. “Scientists’ Thoughts on Scientific Models.” Perspectives on Science 10, no. 3 (Fall 2002): 275–301. Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: From the Cold War through the Dawn of a New Century. New York: Doubleday, 2001. Bamford, James. The Puzzle Palace. A Report on America’s Most Secret Agency. New York: Penguin Books, 1983. Bangemann, Martin, Enrico Cabral da Fonseca, Peter Davis, Carlo de Benedetti, Pehr Gyllenhammar, Lothar Hunsel, Pierre Lescure, et al. “Europe and the Global Information Society: Recommendations of the High-Level Group on the Information Society to the Corfu European Council (Bangemann Group).” Bulletin of the European Union, Supplement No. 2/94 (1994): 5–39. Banisar, David. Cryptography and Privacy Sourcebook. Washington, DC: Electronic Privacy Information Center, 1986. Banisar, David, and Bruce Schneier. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance. New York: Wiley, 1997. Barlow, John Perry. “A Declaration of the Independence of Cyberspace.” Humanist 56, no. 3 (May/June 1996): 18–19. Bautier, Robert-Henri. “L’authentification des actes privés dans la France médiévale: Notariat public et juridiction gracieuse.” In Chartes, sceaux et chancelleries: Études de [3.133.141.6] Project MUSE (2024-04-24 01:40 GMT) Bibliography 235 diplomatique et de sigillographie médiévales, vol. 1, 269–340. Geneva: Librarie Droz, 1990. Bazerman, Charles. The Languages of Edison’s Light. Cambridge, MA: MIT Press, 1999. Bell, C. Gordon, and Jim Gemmell. Total Recall: How the E-Memory Revolution Will Change Everything. New York: Dutton, 2009. Bell, Tim, Harold W. Thimbleby, Mike Fellows, Ian H. Witten, Neal Koblitz, and Matthew Powell. “Explaining Cryptographic Systems.” Computers & Education 40, no. 3 (2003): 199–215. Bellare, Mihir. “Practice-Oriented Provable Security.” In Lectures on Data Security: Modern Cryptology in Theory and Practice, ed. Ivan Damgård, 1–15. Berlin: Springer, 1999. Bellare, Mihir, and Sara Miner. “A Forward-Secure Digital Signature Scheme.” In Advances in Cryptology—Crypto ’99...

Share