메뉴 건너뛰기




Volumn 65, Issue , 2002, Pages 403-419

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs

Author keywords

Digital signatures; Trojan horse programs; Trusted computing platform

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 84904269073     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 2
    • 0030403941 scopus 로고    scopus 로고
    • Possible macro virus attacks and how to prevent them
    • 1996
    • Bontchev, V. (1996). 'Possible macro virus attacks and how to prevent them'. Computers & Security 15(1996):595-626.
    • (1996) Computers & Security , vol.15 , pp. 595-626
    • Bontchev, V.1
  • 3
    • 0005827601 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center (1999). CERT Advisory CA-99-02-Trojan-Horses. http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html
    • (1999) CERT Advisory CA-99-02-Trojan-Horses
  • 5
    • 0032623771 scopus 로고    scopus 로고
    • Macro Attacks: What Next After Melissa?
    • Docherty, P., and P. Simpson (1999). 'Macro Attacks: What Next After Melissa?'. Computers & Security 18(1999):391-395.
    • (1999) Computers & Security , vol.18 , Issue.1999 , pp. 391-395
    • Docherty, P.1    Simpson, P.2
  • 7
    • 0032647856 scopus 로고    scopus 로고
    • Malware: Troy Revisited
    • 1999
    • Ford, R. (1999). 'Malware: Troy Revisited'. Computers & Security 18(1999):105-108.
    • (1999) Computers & Security , vol.18 , pp. 105-108
    • Ford, R.1
  • 10
    • 0005789877 scopus 로고
    • Approaches to Handling "Trojan Horse" Threats
    • Lapid, Y., N. Ahituv and S. Neumann (1986). 'Approaches to Handling "Trojan Horse" Threats'. Computers & Security 5(1986):251-256.
    • (1986) Computers & Security , vol.5 , Issue.1986 , pp. 251-256
    • Lapid, Y.1    Ahituv, N.2    Neumann, S.3
  • 15
    • 84904251704 scopus 로고    scopus 로고
    • The Fairy Tale of What You See Is What You Sign
    • IFIP Working Conference on Security and Control of IT in Society-II. Bratislava, June 2001
    • Spalka, A., A. B. Cremers and H. Langweg (2001). 'The Fairy Tale of "What You See Is What You Sign". Trojan Horse Attacks on Software for Digital Signatures'. IFIP Working Conference on Security and Control of IT in Society-II. Bratislava, June 2001.
    • (2001) Trojan Horse Attacks On Software For Digital Signatures
    • Spalka, A.1    Cremers, A.B.2    Langweg, H.3
  • 16
    • 84904268820 scopus 로고    scopus 로고
    • HUC2K The Second International Symposium on Handheld and Ubiquitous Computing
    • Stabell-Kulø, T. (2000). 'Smartcards: how to put them to use in a user-centric system'. HUC2K The Second International Symposium on Handheld and Ubiquitous Computing. http://www.pasta.cs.uit.no/publications/HUC2K.html.
    • (2000) Smartcards: How to Put Them to Use In a User-centric System
    • Stabell-Kulø, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.