A Java Beans Component Architecture for Cryptographic Protocols
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[2] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[3] C SchmidtDouglas. Using design patterns to develop reusable object-oriented communication software , 1995 .
[4] Rachid Guerraoui,et al. Using the Strategy Design Pattern to Compose Reliable Distributed Protocols , 1997, COOTS.
[5] Jeannette M. Wing,et al. Fast, automatic checking of security protocols , 1996 .
[6] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[7] Jeannette M. Wing,et al. Specification matching of software components , 1995, TSEM.
[8] Robbert van Renesse,et al. Horus: a flexible group communication system , 1996, CACM.
[9] Ross J. Anderson,et al. Programming Satan's Computer , 1995, Computer Science Today.
[10] Peter,et al. Formal Methods for the Analysis of Authentication , 1993 .
[11] Bertrand Meyer. The Next Software Breakthrough , 1997, Computer.
[12] Ralph E. Johnson,et al. Patterns Generate Architectures , 1994, ECOOP.
[13] Larry L. Peterson,et al. A dynamic network architecture , 1992, TOCS.
[14] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[15] Kenneth P. Birman,et al. The ISIS project: real experience with a fault tolerant programming system , 1990, EW 4.
[16] David Garlan,et al. A formal basis for architectural connection , 1997, TSEM.
[17] Douglas C. Schmidt,et al. Using design patterns to develop reusable object-oriented communication software , 1995, CACM.
[18] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[19] S. O'Malley,et al. THE ROAD TO NETWORK SECURITY OR THE VALUE OF SMALL COBBLESTONES , 1994 .
[20] Joyce Farrell. Java Programming , 1999 .
[21] R. E. Johnson,et al. The Conduit: A Communication Abstraction in C++ , 1990, C++ Conference.
[22] Peter Honeyman,et al. Formal Methods for the Analysis of Authentication Protocols , 1993 .
[23] T. Aalto,et al. A Modular, STREAMS Based IPSEC for Solaris 2.x Systems , 1996 .
[24] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[25] Jeannette M. Wing,et al. Specification matching of software components , 1997 .
[26] Ken Arnold,et al. The Java Programming Language , 1996 .
[27] Robbert van Renesse,et al. A security architecture for fault-tolerant systems , 1994, TOCS.
[28] Roy Friedman,et al. A framework for protocol composition in Horus , 1995, PODC '95.
[29] Ralph Johnson,et al. A framework for network protocol software , 1995, OOPSLA.
[30] Colin Boyd,et al. Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.
[31] J. Doug Tygar,et al. A Model for Secure Protocols and Their Compositions , 1996, IEEE Trans. Software Eng..