A Rest Stop on the Unending Road to Provable Security
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. Establishing Software Root of Trust Unconditionally , 2019, NDSS.
[2] Virgil D. Gligor,et al. Requirements for Root of Trust Establishment , 2018, Security Protocols Workshop.
[3] Paul C. van Oorschot,et al. Science of Security: Combining Theory and Measurement to Reflect the Observable , 2018, IEEE Security & Privacy.
[4] Miguel Herrero-Collantes,et al. Quantum random number generators , 2016, 1604.03304.
[5] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[6] Adrian Perrig,et al. VIPER: verifying the integrity of PERipherals' firmware , 2011, CCS '11.
[7] Adrian Perrig,et al. Bootstrapping Trust in Modern Computers , 2011, Springer Briefs in Computer Science.
[8] Virgil D. Gligor. Security Limitations of Virtualization and How to Overcome Them , 2010, Security Protocols Workshop.
[9] Stefano Pironio,et al. Random numbers certified by Bell’s theorem , 2009, Nature.
[10] Butler W. Lampson. Privacy and securityUsable security , 2009, Commun. ACM.
[11] Ivan Damgård,et al. A "proof-reading" of Some Issues in Cryptography , 2007, ICALP.
[12] Virgil D. Gligor. On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) , 2005, Security Protocols Workshop.
[13] Peter Bro Miltersen. Lower Bounds for Static Dictionaries on RAMs with Bit Operations But No Multiplication , 1996, ICALP.
[14] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.