메뉴 건너뛰기




Volumn 122, Issue , 2003, Pages 73-84

Secure audit logging with tamperresistant hardware

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE; SECURITY OF DATA;

EID: 70449635348     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35691-4     Document Type: Conference Paper
Times cited : (38)

References (8)
  • 1
    • 84904355431 scopus 로고    scopus 로고
    • Forward integrity for secure audit logs. Technical report, UC at San Diego, Dept. of Computer Science and Engineering, November
    • Mlihir Bellare and Bennet S. Yee. Forward integrity for secure audit logs. Technical report, UC at San Diego, Dept. of Computer Science and Engineering, November 1997. http://citeseer.nj.llec.com/bellare97forward.pdf.
    • (1997)
    • Bellare, M.1    Yee, B.S.2
  • 3
    • 84904329690 scopus 로고
    • FIPS-PUB-180-l. Secure hash standard. Technical report, US Departmellet of COlllmerce/NIST, Washington D. C., United Stats, April
    • FIPS-PUB-180-l. Secure hash standard. Technical report, US Departmellet of COlllmerce/NIST, Washington D. C., United Stats, April 1995.
    • (1995)
  • 4
    • 0019634370 scopus 로고    scopus 로고
    • Password authentication with insecure communication
    • ACM Press, November 1981
    • Leslie Lamport. Password authentication with insecure communication. In Communications of the ACM, volume 24, pages 770-772. ACM Press, November 1981.
    • Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 5
    • 84904306310 scopus 로고    scopus 로고
    • Handbook of Applied Cryptogmphy, chapter 12. CRC Press, 2001. ISBN: 0-8493-8523-7
    • Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptogmphy, chapter 12. CRC Press, 2001. ISBN: 0-8493-8523-7.
    • Menezes, A.J.1    van Oorschot, P.C.2    Vanstone, S.A.3
  • 6
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs Oil Ulltrusted machines
    • USENIX Press, January
    • Bruce Schneier and John Kelsey. Cryptographic support for secure logs Oil Ulltrusted machines. III The 7th USENIX Security Symposium Proceedings, pages 53-62. USENIX Press, January 1998.
    • (1998) III the 7th USENIX Security Symposium Proceedings , pp. 53-62
    • Schneier, B.1    Kelsey, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.