Hacking: The Art of Exploitation
暂无分享,去创建一个
[1] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[2] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[3] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[4] Laurent Joncheray. A Simple Active Attack Against TCP , 1995, USENIX Security Symposium.
[5] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[6] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[7] Nathan P. Smith,et al. Stack Smashing Vulnerabilities in the UNIX Operating System , 1997 .
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[10] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[11] Gilles Brassard,et al. Fundamentals of Algorithmics , 1995 .
[12] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[13] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .