A Private Data Transfer Protocol Based On A New High Secure Computer Architecture
暂无分享,去创建一个
[1] Sudip Misra,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..
[2] Donghui Guo,et al. Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing , 2006, 2006 International Conference on Computational Intelligence and Security.
[3] Sudip Misra,et al. Message security in mobile ad-hoc networks: Using trust-based multi-path routing approach , 2007 .
[4] Ben Rexworthy. Network Intrusion: Intrusion detections systems - an outmoded network protection model , 2009 .
[5] Bernd Klauer,et al. List of Criteria for a Secure Computer Architecture , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[6] John von Neumann,et al. First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.
[7] Sebastian Wallner,et al. Secure communication in microcomputer bus systems for embedded devices , 2008, J. Syst. Archit..
[8] Robert S. Ledley,et al. Connputer - A Framework of Intrusion-Free Secure Computer Architecture , 2006, Security and Management.
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Julien Bourgeois,et al. A Global Security Architecture for Intrusion Detection on Computer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[11] He Huang,et al. A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus Architecture , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[12] Julien Bourgeois,et al. A global security architecture for intrusion detection on computer networks , 2008, Comput. Secur..
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.