Targeting Physically Addressable Memory
暂无分享,去创建一个
[1] Ming Li,et al. An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Bin Ma,et al. The similarity metric , 2001, IEEE Transactions on Information Theory.
[4] Paul M. B. Vitányi,et al. Clustering by compression , 2003, IEEE Transactions on Information Theory.
[5] John Viega,et al. Network Security with OpenSSL , 2002 .
[6] William I. Gasarch,et al. Book Review: An introduction to Kolmogorov Complexity and its Applications Second Edition, 1997 by Ming Li and Paul Vitanyi (Springer (Graduate Text Series)) , 1997, SIGACT News.
[7] Stephanie Wehner,et al. Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..
[8] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[9] Don Anderson. FireWire System Architecture: IEEE 1394A , 1998 .
[10] Otto Spaniol,et al. Sicherheit in Kommunikationsnetzen - Skript zur Vorlesung an der RWTH-Aachen , 2000, Aachener Beiträge zur Informatik.