Toward a Broader View of Security Protocols
暂无分享,去创建一个
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Angelos D. Keromytis,et al. Experience with the KeyNote Trust Management System: Applications and Future Directions , 2003, iTrust.
[3] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[4] Matt Blaze. Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks , 2002, IACR Cryptol. ePrint Arch..
[5] Jonathan M. Smith,et al. Strongman: a scalable solution to trust management in networks , 2001 .
[6] Michael J. Townsend,et al. Thomas Piketty: Capital in the twenty-first century , 2014, Public Choice.
[7] William A. Arbaugh,et al. Chaining layered integrity checks , 1999 .
[8] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[9] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[10] Sun Meifeng,et al. KeyNote Trust Management System , 2002 .
[11] Joan Feigenbaum,et al. A formal treatment of remotely keyed encryption , 1998, SODA '99.
[12] Scott Shenker,et al. Design guidelines for robust Internet protocols , 2003, CCRV.
[13] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[15] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[16] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[17] Matt Blaze,et al. Rights Amplification in Master-Keyed Mechanical Locks , 2003, IEEE Secur. Priv..
[18] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[19] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[20] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[21] Markus G. Kuhn,et al. Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.
[22] Roger M. Needham,et al. Denial of service: an example , 1994, CACM.