Integrating Network Cryptography into the Operating System
暂无分享,去创建一个
[1] Qing Miao,et al. Analysis of software vulnerability , 2006 .
[2] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[3] Vinton G. Cerf,et al. A protocol for packet network intercommunication , 1974, CCRV.
[4] H. Levkowitz,et al. Reducing User Error by Establishing Encryption Patterns , 2011 .
[5] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[6] W. Richard Stevens,et al. UNIX Network Programming: Networking APIs: Sockets and XTI , 1997 .
[7] Robert E. Kahn,et al. A Protocol for Packet Network Intercommunication , 1974 .
[8] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[9] Dina Katabi,et al. Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.
[10] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.