Flexible OS Support and Applications for Trusted Computing
暂无分享,去创建一个
[1] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[2] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[3] Bennet S. Yee,et al. Dyad : a system for using physically secure coprocessors , 1991 .
[4] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[5] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[6] S. Bellovin. Distributed Firewalls , 1994 .
[7] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[8] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Ari Juels,et al. Client puzzles: A cryptographic defense against connection depletion , 1999 .
[10] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[11] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[12] Amy Carroll,et al. Microsoft Palladium: A Business Overview , 2002 .
[13] Hector Garcia-Molina,et al. Query-flood DoS attacks in gnutella , 2002, CCS '02.
[14] Paul England,et al. Authenticated Operation of Open Computing Devices , 2002, ACISP.
[15] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.