暂无分享,去创建一个
[1] Roland Rieke,et al. The SH-Verification Tool , 2000, FLAIRS.
[2] N. Kuntze,et al. TRUST IN THE P 2 P DISTRIBUTION OF VIRTUAL GOODS , 2009 .
[3] Carsten Rudolph,et al. Trust in Peer-to-Peer Content Distribution Protocols , 2010, Workshop in Information Security Theory and Practice.
[4] Carsten Rudolph,et al. On the Security Validation of Integrated Security Solutions , 2009, SEC.
[5] Carsten Rudolph,et al. Reliable Identities Using Off-the-Shelf Hardware Security in MANETs , 2009, 2009 International Conference on Computational Science and Engineering.
[6] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[7] Michael Howard,et al. The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .
[8] Carsten Rudolph,et al. Towards a Generic Process for Security Pattern Integration , 2009, 2009 20th International Workshop on Database and Expert Systems Application.