Lennon, Brian (Author)
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit. (Worldcat)
...MoreReview Huskey, Samuel J. (October 2019) Review of "Passwords: philology, security, authentication". Technology and Culture (pp. 1126-1127).
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Jerome H. Saltzer;
(January-March 2021)
On the Origin of Kerberos
(/isis/citation/CBB051933073/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Sarah Myers West;
(June 2022)
Cryptography as information control
(/isis/citation/CBB869396949/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Thesis
Gili Vidan;
(2021)
Trading on Trust: Cryptographic Authentication and Digital Decentralization in the United States, 1968–2000
(/isis/citation/CBB882929007/)
Book
Andrew Hodges;
Douglas Hofstadter;
(2014)
Alan Turing: The Enigma: The Book That Inspired the Film "The Imitation Game"
(/isis/citation/CBB485951446/)
Article
Thomas Haigh;
Mark Priestley;
(July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities
(/isis/citation/CBB455159316/)
Book
David D. Clark;
Sandra Braman;
(2018)
Designing an Internet
(/isis/citation/CBB601148284/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Nicholas Paul Sheppard;
(March 2020)
Can Smart Contracts Learn from Digital Rights Management?
(/isis/citation/CBB343046132/)
Article
Foley, Jillian;
(March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations
(/isis/citation/CBB627277329/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/isis/citation/CBB353680957/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
(/isis/citation/CBB653105189/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
(/isis/citation/CBB367643580/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Be the first to comment!