-
1
-
-
84976781807
-
Refelctions on trusting trust. Turing award lecture
-
10.1145/358198.358210
-
K. Thompson 1984 Refelctions on trusting trust. Turing award lecture Communications of the ACM 27 8 761 763 10.1145/358198.358210
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
3
-
-
67650336988
-
Open and closed systems are equivalent (that is, in an ideal world)
-
J. Feller Feller B. Fitzgerald S. A. Hissam K. R. Lakhani (eds). MIT Press Cambridge
-
Anderson R. (2005) Open and closed systems are equivalent (that is, in an ideal world). In: Feller Feller J., Fitzgerald B., Hissam S. A., Lakhani K. R. (eds) Perspectives on free and open source software. MIT Press, Cambridge
-
(2005)
Perspectives on Free and Open Source Software
-
-
Anderson, R.1
-
8
-
-
76949093207
-
A survey of hardware Trojan taxonomy and detection
-
IEEE Computer Society
-
Tehranipoor, M. & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. In Design & Test of Computers, 27(1), 10-25, IEEE Computer Society.
-
(2010)
Design & Test of Computers
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
9
-
-
70449134838
-
Experiences in hardware Trojan design and implementation
-
August 2009
-
Jin, Y., Kupp, N. & Makris, Y. (2009). Experiences in hardware Trojan design and implementation. In Proceedings of IEEE International Workshop on Hardware Oriented Security and Trust, 2009, (HOST'09) (pp. 50-57). August 2009.
-
(2009)
Proceedings of IEEE International Workshop on Hardware Oriented Security and Trust, 2009, (HOST'09)
, pp. 50-57
-
-
Jin, Y.1
Kupp, N.2
Makris, Y.3
-
10
-
-
78650062267
-
-
Version 1.4, February 2011
-
Falliere, N., Murchu, L. O. & Chien, E. (2011). W32.Stuxnet Dossier. Symantec, Version 1.4, February 2011.
-
(2011)
W32.Stuxnet Dossier. Symantec
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
13
-
-
0009481412
-
A survey of trust in internet applications
-
IEEE Communications Society
-
Grandison, T. & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, 3(4), 2-16. IEEE Communications Society.
-
(2000)
Communications Surveys & Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
14
-
-
0020720357
-
On the security of public key protocols
-
IEEE Information Theory Society, March, 1983
-
Dolev, D. & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198-208. IEEE Information Theory Society, March, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
15
-
-
42149161709
-
The psychology of security
-
DOI 10.1145/1330311.1330320
-
R. West 2008 The psychology of security: Why do good users make bad decisions? Communications of the ACM 51 4 34 40 10.1145/1330311.1330320 (Pubitemid 351530776)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
18
-
-
0004149207
-
-
Oxford University Press, England. 30th aniversary edition
-
Dawkins, R. (2006). The selfish gene. Oxford University Press, England. 30th aniversary edition.
-
(2006)
The Selfish Gene
-
-
Dawkins, R.1
-
19
-
-
0003721795
-
-
Oxford University Press, England. Revised and corrected edition
-
Dawkins, R. (2008). The extended phenotype. Oxford University Press, England. Revised and corrected edition.
-
(2008)
The Extended Phenotype
-
-
Dawkins, R.1
-
20
-
-
83555165595
-
Trust and the internet of things
-
Robinson, J., Wakeman, I., Chalmers, D. & Horsfall, B. (2010). Trust and the internet of things. In Proceedings of TruLoco 2010: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing.
-
(2010)
Proceedings of TruLoco 2010: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing
-
-
Robinson, J.1
Wakeman, I.2
Chalmers, D.3
Horsfall, B.4
|