Security of File Backup Method in Computer System
暂无分享,去创建一个
Wuu-Yee Chen | Tsang-Yean Lee | Hong Bin Li | Nai-Wen Kuo | Yann-Jong Hwang | Kai-Tsung Jheng | Tsang-Yean Lee | Wuu-Yee Chen | Nai-Wen Kuo | Y. Hwang | Kai-Tsung Jheng | Hong Bin Li
[1] Gilles Brassard,et al. Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.
[2] Per Brinch Hansen,et al. Operating System Principles , 1973 .
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[5] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[6] Huey-Ming Lee,et al. A Distributed Backup Agent Based on Grid Computing Architecture , 2005, KES.
[7] Satoshi Fukumoto,et al. Optimal backup policy for a database system with incremental and full backups , 2003 .
[8] Shoji Miyaguchi. The FEAL-8 Cryptosystem and a Call for Attack , 1989, CRYPTO.
[9] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[10] Dhiraj K. Pradhan,et al. Roll-forward and rollback recovery: performance-reliability trade-off , 1994, Proceedings of IEEE 24th International Symposium on Fault- Tolerant Computing.
[11] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[12] J. Hartmanis,et al. Advances in Cryptology: Crypto, 90 : Proceedings , 1991 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.