Concurrent Error Detection using Signature Monitoring and Encryption
暂无分享,去创建一个
[1] John Paul Shen,et al. Continuous signature monitoring: efficient concurrent-detection of processor control errors , 1988, International Test Conference 1988 Proceeding@m_New Frontiers in Testing.
[2] M. Y. Hsiao,et al. A class of optimal minimum odd-weight-column SEC-DED codes , 1970 .
[3] Satish M. Thatte,et al. Concurrent Checking of Program Flow in VLSI Processors , 1982, ITC.
[4] John Paul Shen,et al. Processor Control Flow Monitoring Using Signatured Instruction Streams , 1987, IEEE Transactions on Computers.
[5] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[6] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[7] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[8] Peter J. Denning,et al. Computer viruses , 1989 .
[9] Marc Tremblay,et al. The implementation and application of micro rollback in fault-tolerant VLSI systems , 1988, [1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[10] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.
[11] Edward J. McCluskey,et al. Concurrent Error Detection Using Watchdog Processors - A Survey , 1988, IEEE Trans. Computers.
[12] Algirdas Avizienis,et al. A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[13] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[14] Mark Kenneth Joseph. Architectural issues in fault-tolerant, secure computing systems , 1988 .
[15] Masood Namjoo,et al. Techniques for Concurrent Testing of VLSI Processor Operation , 1982, ITC.
[16] Henry Beker,et al. Cipher Systems: The Protection of Communications , 1982 .
[17] Amir Herzberg,et al. Public protection of software , 1985, TOCS.
[18] Shu Lin,et al. An introduction to error-correcting codes , 1970 .