-
1
-
-
0002380073
-
Tamper resistance - A cautionary note
-
Oakland, CA, November
-
R. Anderson, M.G. Kuhn, Tamper resistance - a cautionary note, in: Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996.
-
(1996)
Proceedings of the Second USENIX Workshop on Electronic Commerce
-
-
Anderson, R.1
Kuhn, M.G.2
-
2
-
-
84957355967
-
On the importance of eliminating errors in cryptographic computations
-
D. Boneh, R.A. DeMillo, et al., On the importance of eliminating errors in cryptographic computations, in: Advances in Cryptology: Eurocrypt'97, 1997, pp. 37-51.
-
(1997)
Advances in Cryptology: Eurocrypt'97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
-
3
-
-
0031654007
-
An automated approach for identifying potential vulnerabilities in software
-
Oakland, CA, May
-
A. Ghosh, T. O'Connor, et al., An automated approach for identifying potential vulnerabilities in software, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 1998.
-
(1998)
IEEE Symposium on Security and Privacy
-
-
Ghosh, A.1
O'Connor, T.2
-
4
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystem
-
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystem. Commun. ACM. 21(2):1978;120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
6
-
-
0035789487
-
An experimental study of security vulnerabilities caused by errors
-
Göteborg, Sweden
-
J. Xu, S. Chen, et al., An experimental study of security vulnerabilities caused by errors, in: Proceedings of the International Conference on Dependable Systems and Networks, Göteborg, Sweden, 2001.
-
(2001)
Proceedings of the International Conference on Dependable Systems and Networks
-
-
Xu, J.1
Chen, S.2
-
9
-
-
0034590869
-
Assessment of the applicability of COTS microprocessors in high-confidence computing systems: A case study
-
June
-
Y. He, A. Avizienis, Assessment of the applicability of COTS microprocessors in high-confidence computing systems: a case study, in: Proceedings of the ICDSN 2000, June 2000.
-
(2000)
Proceedings of the ICDSN 2000
-
-
He, Y.1
Avizienis, A.2
-
11
-
-
0030286383
-
A gate-level simulation environment for alpha-particle-induced transient faults
-
H. Cha, E. Rudnick, J. Patel, et al., A gate-level simulation environment for alpha-particle-induced transient faults, IEEE Trans. Comput. 45 (11) (1996) 1248-1256.
-
(1996)
IEEE Trans. Comput.
, vol.45
, Issue.11
, pp. 1248-1256
-
-
Cha, H.1
Rudnick, E.2
Patel, J.3
-
13
-
-
0026171135
-
Error/failure analysis using event logs from fault tolerant systems
-
June
-
I. Lee, R. Iyer, D. Tang, Error/failure analysis using event logs from fault tolerant systems, in: Proceedings of the IEEE International Symposium on Fault-Tolerant Computing (FTCS-21), June 1991, pp. 10-17.
-
(1991)
Proceedings of the IEEE International Symposium on Fault-tolerant Computing (FTCS-21)
, pp. 10-17
-
-
Lee, I.1
Iyer, R.2
Tang, D.3
-
14
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R., Deswarte Y., Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng. 25(5):1999;633-650.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
15
-
-
1042278622
-
Mobius: An extensible tool for performance and dependability modeling
-
TOOLS 2000, Schaumburg, IL, March
-
D. Daly, D.D. Deavours, et al., Mobius: an extensible tool for performance and dependability modeling, in: Proceedings of the 11th International Conference, TOOLS 2000, Schaumburg, IL, March 2000.
-
(2000)
Proceedings of the 11th International Conference
-
-
Daly, D.1
Deavours, D.D.2
-
16
-
-
1042290204
-
-
December 30
-
http://www.securityfocus.com , December 30, 2001.
-
(2001)
-
-
-
18
-
-
0004302191
-
-
Morgan Kaufmann, Los Altos, CA
-
D. Patterson, J. Hennessy, Computer Architecture a Quantitative Approach, 2nd ed., Morgan Kaufmann, Los Altos, CA, 1996, 384 pp.
-
(1996)
Computer Architecture a Quantitative Approach, 2nd Ed.
, pp. 384
-
-
Patterson, D.1
Hennessy, J.2
-
19
-
-
0012238873
-
Advanced methods for detecting unusual behaviors on networks in real-time
-
WCC-ICCT 2000
-
G. Xu, H. Zhang, Advanced methods for detecting unusual behaviors on networks in real-time, in: Proceedings of the IEEE International Conference on Communication Technology, vol. 1, WCC-ICCT 2000, 2000, pp. 291-295.
-
(2000)
Proceedings of the IEEE International Conference on Communication Technology
, vol.1
, pp. 291-295
-
-
Xu, G.1
Zhang, H.2
-
20
-
-
84949230268
-
RSA-type signatures in the presence of transient fault
-
Springer, Berlin
-
M. Joye, J.-J. Quisquater, F. Bao, R.H. Deng, RSA-type signatures in the presence of transient fault, in: Cryptography and Coding, Lecture Notes in Computer Science, vol. 1335, Springer, Berlin, 1997, pp. 155-160.
-
(1997)
Cryptography and Coding, Lecture Notes in Computer Science
, vol.1335
, pp. 155-160
-
-
Joye, M.1
Quisquater, J.-J.2
Bao, F.3
Deng, R.H.4
-
21
-
-
84944878354
-
-
CRC Press, Boca Raton
-
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996, pp. 284-291.
-
(1996)
Handbook of Applied Cryptography
, pp. 284-291
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
22
-
-
0004306797
-
-
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Urbana, IL
-
D. Stott, Automated fault-injection-based dependability analysis of distributed computer systems, Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Urbana, IL, 2001.
-
(2001)
Automated Fault-injection-based Dependability Analysis of Distributed Computer Systems
-
-
Stott, D.1
-
24
-
-
0012561327
-
Coming challenges in microarchitecture and architecture
-
R. Ronen, A. Mendelson, K. Lai, et al., Coming challenges in microarchitecture and architecture, Proc. IEEE 89 (3) (2001) 325-340.
-
(2001)
Proc. IEEE
, vol.89
, Issue.3
, pp. 325-340
-
-
Ronen, R.1
Mendelson, A.2
Lai, K.3
-
25
-
-
0029732375
-
IBM experiments in soft fails in computer electronics (1978-1994)
-
Ziegler J.F., et al. IBM experiments in soft fails in computer electronics (1978-1994). IBM J. R&D. 40(1):1996;3-18.
-
(1996)
IBM J. R&D
, vol.40
, Issue.1
, pp. 3-18
-
-
Ziegler, J.F.1
-
26
-
-
1042290202
-
-
Berkshire Products Inc.
-
PCI PC Watchdog Board User's Manual, Berkshire Products Inc. http://www.berkprod.com/pci_pc_watchdog.htm .
-
PCI PC Watchdog Board User's Manual
-
-
-
27
-
-
1042301847
-
-
IPAudit
-
IPAudit. http://ipaudit.sourceforge.net/.
-
-
-
|