How to withstand mobile virus attacks (extended abstract)
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. Auditing the use of covert storage channels in secure systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Donald Beaver,et al. Multiparty computation with faulty majority , 1989, 30th Annual Symposium on Foundations of Computer Science.
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Paul A. Karger,et al. Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.
[6] Silvio Micali,et al. Collective Coin Tossing Without Assumptions nor Broadcasting , 1990, CRYPTO.
[7] Edsger W. Dijkstra,et al. Self-stabilizing systems in spite of distributed control , 1974, CACM.
[8] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[9] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[10] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[11] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[12] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[13] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[14] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[15] Robert E. Tarjan,et al. Making data structures persistent , 1986, STOC '86.
[16] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[17] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[18] Shay Kutten,et al. New models and algorithms for future networks , 1988, PODC '88.
[19] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[20] Moti Yung,et al. Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model , 1987, CRYPTO.
[21] V. Rich. Personal communication , 1989, Nature.
[22] Jeffrey Picciotto. The Design of an Effective Auditing Subsystem , 1987, 1987 IEEE Symposium on Security and Privacy.
[23] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[24] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[25] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[26] Algirdas Avizienis,et al. A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.