Internet Security Dictionary
暂无分享,去创建一个
[1] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[2] Roger M. Needham,et al. Experience with Grapevine: the growth of a distributed system , 1984, TOCS.
[3] " Cryptography : A New Dimension in Computer Data , 2022 .
[4] Peter J. Denning,et al. Computers under attack: intruders, worms, and viruses , 1991 .
[5] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[6] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[7] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[8] Alfred Menezes,et al. Elliptic Curves and Cryptography , 1999 .
[9] Stephen M. Matyas,et al. Message Authentication with Manipulation Detection Code , 1983, 1983 IEEE Symposium on Security and Privacy.
[10] G. T. Gangemi,et al. Computer Security Basics , 2006 .
[11] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[12] Ralph C. Merkle,et al. A fast software one-way hash function , 1990, Journal of Cryptology.
[13] Peter Williams,et al. Digital Certificates: Applied Internet Security , 1998 .
[14] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[17] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[18] Martin E. Hellman. I. `DES will be totally insecure within ten years¿ , 1979, IEEE Spectrum.
[19] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[20] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[21] Thomas Beth,et al. Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.
[22] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[23] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[24] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[25] M. Rabin. Probabilistic algorithm for testing primality , 1980 .
[26] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[27] Carey Nachenberg,et al. Computer virus-antivirus coevolution , 1997, Commun. ACM.
[28] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[29] Uyless D. Black. Internet Security Protocols: Protecting IP Traffic , 2000 .
[30] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[31] Warwick Ford. Advances in public-key certificate standards , 1995, SGSC.
[32] W. Ford,et al. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .
[33] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[34] Yvo Desmedt,et al. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.
[35] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[36] J. Linn. Practical authentication for distributed computing , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[37] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[38] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[39] Bernhard Plattner,et al. X400 message handling - standards, interworking, applications , 1992, Data communications and networks series.
[40] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[41] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[42] Burton S. Kaliski. A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .
[43] Charles P. Pfleeger,et al. Security in computing , 1988 .
[44] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[45] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[46] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, Annual International Cryptology Conference.
[47] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[48] Andrew M. Odlyzko,et al. Computation of discrete logarithms in prime fields , 1991, Des. Codes Cryptogr..
[49] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[50] Andrew Birrell. Secure communication using remote procedure calls , 1985, TOCS.
[51] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[52] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[53] Shoji Miyaguchi,et al. Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.
[54] Hans Eberle,et al. A High-Speed DES Implementation for Network Applications , 1992, CRYPTO.
[55] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.
[56] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[57] Ross Ihaka,et al. Cryptographic Randomness from Air Turbulence in Disk Drives , 1994, CRYPTO.
[58] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[59] Aviel D. Rubin. An Experience Teaching a Graduate Course in Cryptography , 1997, Cryptologia.
[60] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[61] Vaughan Black,et al. The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1994 .
[62] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[63] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[64] Warwick Ford,et al. Computer communication security - principles, standard protocols and techniques , 2008 .
[65] Sallie M. Henry,et al. Software Structure Metrics Based on Information Flow , 1981, IEEE Transactions on Software Engineering.
[66] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[67] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[68] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[69] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[70] Dorothy E. Denning,et al. The SeaView Security Model , 1990, IEEE Trans. Software Eng..
[71] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[72] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[73] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[74] Gene Tsudik,et al. KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.
[75] Ravi S. Sandhu,et al. A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up , 1993, J. Comput. Secur..
[76] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[77] J.J. Tardo,et al. SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[78] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[79] Derrick Grover,et al. Cryptography: A Primer , 1982 .
[80] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[81] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[82] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[83] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[84] M Gasser,et al. A Random Word Generator for Pronounceable Passwords , 1975 .
[85] James Arlin Cooper. Computer and communications security: strategies for the 1990s , 1989 .
[86] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[87] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[88] John McLean,et al. Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.
[89] Martin E. Hellman,et al. On the security of multiple encryption , 1981, CACM.
[90] Roger M. Needham,et al. Grapevine: an exercise in distributed computing , 1982, CACM.
[91] Antoon Bosselaers,et al. An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.
[92] Steve R. White,et al. Fighting Computer Viruses , 1997 .
[93] Baoqing Ye,et al. Defeating Denial-of-Service Attacks on the Internet , 2001, ICICS.
[94] W. Richard Stevens,et al. TCP/IP Illustrated, Volume 1: The Protocols , 1994 .
[95] S. Bradner,et al. IPng: Internet protocol next generation , 1996 .
[96] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[97] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[98] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[99] Gene Tsudik,et al. Robust and Secure Password and Key Change Method , 1994, ESORICS.
[100] Rik Farrow. Unix System Security: How to Protect Your Data and Prevent Intruders , 1991 .
[101] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[102] Eli Biham,et al. Differential Cryptanalysis of Lucifer , 1993, CRYPTO.
[103] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[104] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[105] Adi Shamir,et al. On the Generation of Cryptographically Strong Pseudo-Random Sequences , 1981, ICALP.
[106] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[107] Selim G. Aki. Digital signatures: A tutorial survey , 1983, Computer.
[108] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[109] Radia Perlman. Interconnections: Bridges and Routers , 1992 .
[110] Butler W. Lampson,et al. A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.
[111] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[112] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[113] Gilles Brassard,et al. Sorting out Zero-Knowledge , 1990, EUROCRYPT.
[114] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[115] Walter Fumy,et al. Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..
[116] D. Balenson. Automated distribution of cryptographic keys using the financial institution key management standard , 1985, IEEE Communications Magazine.
[117] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[118] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[119] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[120] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[121] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[122] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[123] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[124] Ronald L. Rivest,et al. Is the Data Encryption Standard a group? (Results of cycling experiments on DES) , 1988, Journal of Cryptology.
[125] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[126] A. Lyman Chapin,et al. Open Systems Networking: Tcp/Ip and Osi , 1993 .
[127] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[128] M.E. Hellman,et al. An overview of public key cryptography , 1978, IEEE Communications Magazine.
[129] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[130] Warren A. Harrison,et al. A complexity measure based on nesting level , 1981, SIGP.
[131] David Ferbrache,et al. A pathology of computer viruses , 1991 .
[132] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[133] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[134] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[135] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .