The following publications are possibly variants of this publication:
- What Did We Do Before Biometric Passports? A Review of ::::Who Are You? Identification, Deception, and Surveillance in Early Modern Europe:::: by Valentin GroebnerWhitfield Diffie. cryptologia, 32(4):368-369, 2008. [doi]
- Cryptographic technology: fifteen year forecastWhitfield Diffie. sigact, 14(4):38-57, 1982. [doi]
- Chattering about SIGINTWhitfield Diffie. ieeesp, 4(1):9, 2006. [doi]
- The first ten years of public-key cryptographyWhitfield Diffie. pieee, 76(5):560-577, 1988. [doi]
- Information security: 50 years behind, 50 years aheadWhitfield Diffie. CACM, 51(1):55-57, 2008. [doi]
- E-commerce and securityWhitfield Diffie. standardview, 6(3):116-117, 1998. [doi]
- The National Security Establishment and the Development of Public-Key CryptographyWhitfield Diffie. dcc, 7(1-2):9-12, 1996.
- Ultimate cryptographyWhitfield Diffie. CACM, 44(3):84-86, 2001. [doi]
- Cryptography: Past, Present and FutureWhitfield Diffie. otm 2007: 1529-1530 [doi]
- The Adolescence of Public-Key Cryptography (Abstract)Whitfield Diffie. eurocrypt 1989: 2 [doi]
- Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted SystemsWhitfield Diffie. sp 1983: 136-138
- The Evolving Meaning of Information SecurityWhitfield Diffie. kdd 2016: 5 [doi]