메뉴 건너뛰기




Volumn 7638 LNCS, Issue , 2012, Pages 248-263

Defending against the unknown enemy: Applying FLIPIT to system security

Author keywords

[No Author keywords available]

Indexed keywords

COMPLETE CONTROL; CRYPTOGRAPHIC KEY; CRYPTOGRAPHIC SYSTEMS; GAME-THEORETIC MODEL; PASSWORD RESET; PRIVATE KEY; REAL-WORLD PROBLEM; SYSTEM KNOWLEDGE; SYSTEM SECURITY; UNIQUE FEATURES;

EID: 84869448367     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34266-0_15     Document Type: Conference Paper
Times cited : (55)

References (15)
  • 2
    • 84869471413 scopus 로고    scopus 로고
    • Recommendation for key management II: Best practices for key management organization
    • Barker, E., Barker, W., Polk, W., Smid, M.: Recommendation for key management II: Best practices for key management organization. NIST SP (2/3), 1-79 (2005)
    • (2005) NIST SP , Issue.2-3 , pp. 1-79
    • Barker, E.1    Barker, W.2    Polk, W.3    Smid, M.4
  • 4
    • 40249118370 scopus 로고    scopus 로고
    • Bridging Game Theory and Cryptography: Recent Results and Future Directions
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Katz, J.: Bridging Game Theory and Cryptography: Recent Results and Future Directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 251-272
    • Katz, J.1
  • 7
    • 78751561458 scopus 로고    scopus 로고
    • Would a "cyber warrior" protect us? Exploring tradeoffs between attack and defense of information systems
    • Moore, T., Friedman, A., Procaccia, A.:Would a "cyber warrior" protect us? Exploring tradeoffs between attack and defense of information systems. In: NSPW, pp. 85-94 (2010)
    • (2010) NSPW , pp. 85-94
    • Moore, T.1    Friedman, A.2    Procaccia, A.3
  • 10
    • 84861164891 scopus 로고    scopus 로고
    • Gaming security by obscurity
    • abs/1109.5542
    • Pavlovic, D.: Gaming security by obscurity, CoRR abs/1109.5542 (2011)
    • (2011) CoRR
    • Pavlovic, D.1
  • 12
    • 84866651452 scopus 로고    scopus 로고
    • Illegitimi non carborundum
    • Invited keynote talk given at August 15
    • Rivest, R.L.: Illegitimi non carborundum. Invited keynote talk given at CRYPTO 2011 (August 15, 2011), http://people.csail.mit.edu/rivest/pubs. html#Riv11b
    • (2011) CRYPTO 2011
    • Rivest, R.L.1
  • 15
    • 84869428138 scopus 로고    scopus 로고
    • Justify identity management investment with metrics
    • February 23
    • Witty, R.J., Brittain, K., Allen, A.: Justify identity management investment with metrics. Gartner Group report (February 23, 2004)
    • (2004) Gartner Group Report
    • Witty, R.J.1    Brittain, K.2    Allen, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.