REFERENCES

M. ABRAMOWITZ AND I. STEGUN, Handbook of Mathematical Functions, Dover Publications, Mineola, New York, 1972.

L. E. BAUM, “An Inequality and Associated Maximization Technique in Statistical Estimation for Probabilistic Functions of a Markov Process,” inequalities, 3, 1–8 (1982).

L. E. BAUM, T. PETRIE, G. SOULES, AND N. WEISS, “A Maximization Technique occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains,” The Annals of Mathematical Statistics, 41, 165–171 (1969).

O. CAPPE, E. MOULINES, T. RYDEN, AND O. CAPPI, Inference in Hidden Markov Models, Springer, New York, NY, 2005.

A. P. DEMPSTER, N. M. LAIRD, AND D. B. RUBIN, “Maximum Likelihood from Incomplete Data Via the EM Algorithm,” Journal of the Royal Statistical Society, Part B, 39, 1–38 (1977).

R. J. ELLIOTT, Hidden Markov Models, Springer, New York, NY, 1997.

W. FRIEDMAN, Military Cryptanalysis, U.S. Government Printing Office (Laguna Hills, New York), 1944.

W. KAPLAN, Advanced Calculus, Addison-Wesley, 2003.

L. S. HILL, “Cryptography in an Algebraic Alphabet,” American Mathematical Monthly, 36, 306–312 (1929).

R. A. KEMMERER, “An Overview of Computer Security,” invited paper at the IMA Conference on Cryptography and Coding, Cirencester, England, December 1986; also included in Cryptography and Coding, H. J. BEKER AND F. C. PIPER(eds), Oxford University Press, Oxford, 1989.

A. G. KONHEIM, Cryptography: A Primer, Wiley, New York, NY, 1981.

S. KULLBACK AND R. A. LEIBLER, “On Information ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.