Why cryptosystems fail
暂无分享,去创建一个
[1] Wai Wong,et al. Application of formal methods to railway signalling—a case study , 1993 .
[2] Donald W. Davies,et al. Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.) , 1989, Wiley series in communication and distributed systems.
[3] Karen R. Sollins,et al. Towards Security in an Open Systems Federation , 1992, ESORICS.
[4] Richard Outerbridge,et al. Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's , 1991, Cryptologia.
[5] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[6] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[7] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[8] Ross J. Anderson. UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.
[9] Abraham Bookstein,et al. Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .
[10] Alan Burns,et al. On the Meaning of Safety and Security , 1992, Comput. J..
[11] T. Kuhn. The Structure of Scientific Revolutions. , 1964 .
[12] Marie A. Wright. Security controls in ATM systems , 1991 .
[13] Michael J. Kelly,et al. Common Cryptographic Architecture Cryptographic Application Programming Interface , 1991, IBM Syst. J..
[14] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[15] Ken Wong. Data security — watch out for the new computer criminals , 1987 .
[16] Harold Joseph Highland,et al. Perspectives in Information Technology Security , 1992, IFIP Congress.