메뉴 건너뛰기




Volumn 1998-November, Issue , 1998, Pages 166-170

Security and dependability: Then and now

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84887213132     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSDA.1998.798363     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies, AFJPS Press
    • G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the Notional Computer Conference, pages 313-317-American Federation of Information Processing Societies, AFJPS Press, 1979.
    • (1979) Proceedings of the Notional Computer Conference , pp. 313-317
    • Blakley, G.R.1
  • 3
    • 84961369151 scopus 로고
    • Security of ramp schemes
    • G. R. Blakley and David Chaum, editors, Springer-Verlag LNCS
    • G. R. Blakley and C. A. Meadows. Security of ramp schemes. In G. R. Blakley and David Chaum, editors. Proceedings of Crypto '84, pages 242-268, Springer-Verlag LNCS 196, 1984.
    • (1984) Proceedings of Crypto '84 , vol.196 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.A.2
  • 5
    • 0002911802 scopus 로고    scopus 로고
    • Some recent research results in threshold cryptography
    • E. Okamoto, G. Davida, and M. Mambo, editors. Springer-Verlag LNCS 1396
    • Yvo Desmedt. Some recent research results in threshold cryptography. In E. Okamoto, G. Davida, and M. Mambo, editors. Information Security. Proceedings, pages 158-173. Springer-Verlag LNCS 1396, 1997.
    • (1997) Information Security. Proceedings , pp. 158-173
    • Desmedt, Y.1
  • 8
    • 0032047528 scopus 로고    scopus 로고
    • Design and assurance strategy for the NRL Pump
    • April
    • Myong Kang, Andrew Moore, and Ira Moskowiiz. Design and assurance strategy for the NRL Pump. IEEE Computer Magazine, 31 (4), April 1998.
    • (1998) IEEE Computer Magazine , vol.31 , Issue.4
    • Kang, M.1    Moore, A.2    Moskowiiz, I.3
  • 12
    • 84955619209 scopus 로고    scopus 로고
    • Applying the dependability paradigm to computer security
    • IEEE Computer Society Press
    • Catherine Meadows. Applying the dependability paradigm to computer security. In Proceedings of the 1995New Security Paradigms Workshop. IEEE Computer Society Press, 1996.
    • (1996) Proceedings of the 1995New Security Paradigms Workshop
    • Meadows, C.1
  • 17
    • 84964479786 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • In M Dal Cin, C. Meadows, and W. H. Sanders, editors. IEEE Computer Society
    • R. Ortalo, Y. Deswarte, and M. Kaanidie, Experimenting with quantitative evaluation tools for monitoring operational security. In M. Dal Cin, C. Meadows, and W. H. Sanders, editors, Dependable Computing for Critical Applications 6, pages 307-328. IEEE Computer Society, 1998.
    • (1998) Dependable Computing for Critical Applications , vol.6 , pp. 307-328
    • Ortalo, R.1    Deswarte, Y.2    Kaanidie, M.3
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.