Secure Audit Logging with Tamper-Resistant Hardware
暂无分享,去创建一个
[1] Bruce Schneier,et al. Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs , 1999, Recent Advances in Intrusion Detection.
[2] Stefan Lucks,et al. The Performance of Modern Block Ciphers in Java , 1998, CARDIS.
[3] Bruce Schneier,et al. Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.
[4] Berry Schoenmakers. Basic Security of the ecash Payment System , 1997 .
[5] Sean W. Smith,et al. Application Support Architecture for a High-Performance, Programmable Secure Coprocessor , 1999 .
[6] William Aiello,et al. Using smartcards to secure a personalized gambling device , 1999, CCS '99.
[7] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[8] Jonathan Knudsen. Java cryptography , 1998, Java series.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Xavier Leroy. On-Card Bytecode Verification for Java Card , 2001, E-smart.
[11] Peter Gutmann. An Open-Source Cryptographic Coprocessor , 2000, USENIX Security Symposium.
[12] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[13] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[14] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[15] M. Ruffin,et al. A Survey of Logging Uses , 1994 .
[16] Pieter H. Hartel,et al. Security Attributes Based Digital Rights Management , 2002, IDMS/PROMS.
[17] James H. Burrows,et al. Secure Hash Standard , 1995 .
[18] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[19] Markus Jakobsson,et al. Mix-Based Electronic Payments , 1998, Selected Areas in Cryptography.
[20] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[21] Radek Vingralek,et al. How to Manage Persistent State in DRM Systems , 2001, Digital Rights Management Workshop.
[22] David Clausen,et al. Secure Voting Using Disconnected , Distributed Polling Devices , 2000 .
[23] Bruce Schneier,et al. Automatic Event-Stream Notarization Using Digital Signatures , 1996, Security Protocols Workshop.
[24] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[25] Alain Durand. Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card , 1998, CARDIS.
[26] Bruce Schneier,et al. Twosh on Smart Cards , 2000 .
[27] Bruce Schneier,et al. Twofish on Smart Cards , 1998, CARDIS.