Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare
暂无分享,去创建一个
Vyacheslav S. Kharchenko | Nikolaos Doukas | Nikolaos G. Bardis | Oleksandr P. Markovskyi | Maryna Kolisnyk | Peter Stavroulakis
[1] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[2] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[3] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[4] Jennifer Seberry,et al. Nonlinearity and Propagation Characteristics of Balanced Boolean Functions , 1995, Inf. Comput..
[5] Nikolaos Doukas,et al. Efficient zero — Knowledge identification based on one way Boolean transformations , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[6] Khaled A. S. Abdel-Ghaffar,et al. Parity-Check Matrices Separating Erasures From Errors , 2013, IEEE Transactions on Information Theory.
[7] Dou Bing-Lin,et al. Research on Survivability of Networked Information System , 2009, 2009 International Conference on Signal Processing Systems.
[8] Nikolaos Doukas,et al. Fast subscriber identification based on the zero knowledge principle for multimedia content distribution , 2010, Int. J. Multim. Intell. Secur..
[9] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[10] Jia-Lun Tsai,et al. Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..
[11] Vyacheslav Kharchenko,et al. Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model , 2016, 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI).
[12] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[13] Yun Liu and Kishore S. Trivedi,et al. Survivability Quantification: The Analytical Modeling Approach , 2006 .
[14] Athanasios Drigas,et al. Two level efficient user authentication scheme , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[15] N. G. Bardis,et al. Organization of the polymorphic implementation of Rijndael on microcontrollers and smart cards , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[16] Kaoru Kurosawa,et al. Strongly universal hashing and identification codes via channels , 1999, IEEE Trans. Inf. Theory.
[17] Kishor S. Trivedi,et al. Survivability quantification of communication services , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[18] Vinod M. Prabhakaran,et al. Decentralized erasure codes for distributed networked storage , 2006, IEEE Transactions on Information Theory.
[19] Nikolaos Doukas,et al. Effective method to restore data in distributed data storage systems , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[20] Mario Blaum,et al. Partial-MDS Codes and Their Application to RAID Type of Architectures , 2012, IEEE Transactions on Information Theory.
[21] Peter Stavroulakis. Reliability, survivability and quality of large scale telecommunication systems : case study: Olympic Games , 2002 .
[22] James L. Massey,et al. Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972) , 1973, IEEE Trans. Inf. Theory.
[23] Jean-Marc Robert,et al. Security and usability: the case of the user authentication methods , 2006, IHM '06.
[24] Kevin J. Sullivan,et al. Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.