Toward a secure system engineering methodolgy
暂无分享,去创建一个
Bruce Schneier | O. Sami Saydjari | O. S. Saydjari | Chris Slater | Jim Wallner | C. Slater | B. Schneier | J. Wallner | Chris Slater
[1] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[4] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[5] Michael Alexander. Net Security: Your Digital Doberman: Sure-Fire Strategies for Wired Businesses , 1996 .
[6] Duane Andrews. Report of the Defense Science Board Task Force on Information Warfare-Defense (IW-D). , 1996 .
[7] Moti Yung,et al. The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? , 1996, CRYPTO.
[8] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[9] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.