An Overview of Information Security
暂无分享,去创建一个
Ana Isabel González-Tablas Ferreres | Arturo Ribagorda Garnacho | Almudena Alcaide Raya | A. Garnacho | A. A. Raya
[1] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[2] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[3] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[7] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[8] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[9] Ralph Howard,et al. Data encryption standard , 1987 .
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..