Protecting applications with transient authentication
暂无分享,去创建一个
[1] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[2] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] P. L. Venetianer,et al. An Iris Biometric System for Public and Personal Use , 2000, Computer.
[5] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[6] Abraham Silberschatz,et al. Operating Systems Concepts , 2005 .
[7] Brian D. Noble,et al. The case for transient authentication , 2002, EW 10.
[8] Niels Provos,et al. Encrypting Virtual Memory , 2000, USENIX Security Symposium.
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[10] Chatschik Bisdikian,et al. Bluetooth Revealed , 2000 .
[11] Matt Blaze,et al. Key Management in an Encrypting File System , 1994, USENIX Summer.
[12] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[13] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[14] Peter Honeyman,et al. Long Running Jobs in an Authenticated Environment , 1993, USENIX Security Symposium.
[15] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[16] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[17] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[18] William A. Arbaugh,et al. Personal Secure Booting , 2001, ACISP.
[19] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[20] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[21] Mandayam T. Raghunath,et al. Application design for a smart watch with a high resolution display , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.
[22] Peter Honeyman,et al. Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.
[23] P. Jonathon Phillips,et al. An Introduction to Evaluating Biometric Systems , 2000, Computer.
[24] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[25] William Stallings,et al. PGP Message Exchange Formats , 1996, RFC.
[26] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[27] Markus Jakobsson,et al. How to Forget a Secret , 1999, STACS.
[28] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[29] Alan O. Freier,et al. SSL Protocol Version 3.0 Internet Draft , 1996 .
[30] Carl E. Landwehr,et al. Protecting unattended computers without software , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[31] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[32] Richard J. Lipton,et al. A Revocable Backup System , 1996, USENIX Security Symposium.
[33] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.