-
1
-
-
84958656559
-
Pseudo-random” number generation within cryptographic algorithms: The DDS case
-
M. Bellare, S. Goldwasser, and D. Micciancio.”Pseudo-random” number generation within cryptographic algorithms: The DDS case. In CRYPTO, pages 277-291, 1997.
-
(1997)
CRYPTO
, pp. 277-291
-
-
Bellare, M.1
Goldwasser, S.2
Micciancio, D.3
-
2
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
S. M. Bellovin. Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev., 19(2):32-48, 1989.
-
(1989)
SIGCOMM Comput. Commun. Rev
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S. M.1
-
3
-
-
38149027490
-
When virtual is better than real
-
(HOTOS-VIII), Schloss Elmau, Germany, May
-
P. M. Chen and B. D. Noble. When virtual is better than real. In (HOTOS-VIII), Schloss Elmau, Germany, May 2001.
-
(2001)
-
-
Chen, P. M.1
Noble, B. D.2
-
4
-
-
11844249640
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
-
(2002)
OSDI
-
-
Dunlap, G. W.1
King, S. T.2
Cinar, S.3
Basrai, M. A.4
Chen, P. M.5
-
5
-
-
0023569922
-
Zero knowledge proofs of identity
-
New York, NY, USA, ACM Press
-
U. Fiege, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. In STOC'87: Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 210-217, New York, NY, USA, 1987. ACM Press.
-
(1987)
STOC'87: Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 210-217
-
-
Fiege, U.1
Fiat, A.2
Shamir, A.3
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003), October 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
18844373595
-
Virtual appliances in the Collective: A road to hassle-free computing
-
(HOTOS-XI), May
-
C. Sapuntzakis and M. S. Lam. Virtual appliances in the Collective: A road to hassle-free computing. In (HOTOS-XI), May 2003.
-
(2003)
-
-
Sapuntzakis, C.1
Lam, M. S.2
-
12
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
13
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proc. of ACM SIGCOMM, August 2004.
-
(2004)
Proc. of ACM SIGCOMM
-
-
Wang, H. J.1
Guo, C.2
Simon, D. R.3
Zugenmaier, A.4
|