메뉴 건너뛰기




Volumn 42, Issue 7, 1999, Pages 33-37

High-Confidence Design for Security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0003282482     PISSN: 00010782     EISSN: None     Source Type: Journal    
DOI: 10.1145/306549.306560     Document Type: Article
Times cited : (11)

References (12)
  • 2
    • 0032048379 scopus 로고    scopus 로고
    • Systematic software testing using VeriSoft: An analysis of the 4ESS heart-beat monitor
    • Apr.-June
    • Godefroid, P., Hanmer, R.S., and Jagadeesan, L.J. Systematic software testing using VeriSoft: An analysis of the 4ESS heart-beat monitor. Bell Labs Technical Journal 3, 2 (Apr.-June 1998).
    • (1998) Bell Labs Technical Journal , vol.3 , Issue.2
    • Godefroid, P.1    Hanmer, R.S.2    Jagadeesan, L.J.3
  • 3
    • 0007694967 scopus 로고
    • A proof generating system for higher-order logic
    • G. Birtwistle and P.A. Subramanyam, Eds., Kluwer
    • Gordon, M.J.C. A proof generating system for higher-order logic. In G. Birtwistle and P.A. Subramanyam, Eds., VLSI Specification, Verification, and Synthesis. Kluwer, 1987.
    • (1987) VLSI Specification, Verification, and Synthesis
    • Gordon, M.J.C.1
  • 6
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Nov.
    • Lampson, B., Abadi, M., Burroughs, M. and Wobber, E. Authentication in distributed systems: Theory and practice. ACM Trans. Computer Systems 10, 4 (Nov. 1992), 265-310.
    • (1992) ACM Trans. Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burroughs, M.3    Wobber, E.4
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 10
    • 0032165313 scopus 로고    scopus 로고
    • A practical methodology for the formal verification of RISC processors
    • Tahar, S. and Kumar, R. A practical methodology for the formal verification of RISC processors. Formal Methods in System Design 13, 2 (1998), 159-225.
    • (1998) Formal Methods in System Design , vol.13 , Issue.2 , pp. 159-225
    • Tahar, S.1    Kumar, R.2
  • 11
    • 33846432831 scopus 로고
    • Authentication in the TAOS operating system
    • Digital Equipment Corporation Systems Research Center, Palo Alto, CA Dec
    • Wobber, E., Abadi, M., Burroughs, M., and Lampson, B. Authentication in the TAOS Operating System. Report 117, Digital Equipment Corporation Systems Research Center, Palo Alto, CA (Dec. 1993).
    • (1993) Report , vol.117
    • Wobber, E.1    Abadi, M.2    Burroughs, M.3    Lampson, B.4
  • 12
    • 0042089118 scopus 로고    scopus 로고
    • Verifying privacy enhanced mail functions with higher order logic
    • Zhou D. and Chin, S.K. Verifying privacy enhanced mail functions with higher order logic. DIMACS Series in Discrete Mathematics 38 (1998), 11-20.
    • (1998) DIMACS Series in Discrete Mathematics , vol.38 , pp. 11-20
    • Zhou, D.1    Chin, S.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.