-
1
-
-
84959133206
-
Top 10 2013-A6-Sensitive Data Exposure
-
2013-02
-
The OWASP Foundation. Top 10 2013-A6-Sensitive Data Exposure [EB/OL]. (2013-02). https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure.
-
-
-
The OWASP Foundation1
-
2
-
-
84887501378
-
2013 Data Breach Investigations Report
-
Verizon. 2013 Data Breach Investigations Report [EB/OL]. (2013). http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf.
-
(2013)
-
-
-
3
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
New York, NY: ACM Press
-
Popa R A, Redfield C, Zeldovich N, et al. Cryptdb: Protecting confidentiality with encrypted query processing [C]// Proceedings of the 23rd ACM Symposium on Operating Systems Principles. New York, NY: ACM Press, 2011: 85-100.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.2
Zeldovich, N.3
-
5
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
Piscataway, NJ: IEEE Press
-
Parno B, McCune J M, Wendlandt D, et al. CLAMP: Practical prevention of large-scale data leaks [C]// Security and Privacy, 2009 30th IEEE Symposium on. Piscataway, NJ: IEEE Press, 2009: 154-169.
-
(2009)
Security and Privacy, 2009 30th IEEE Symposium on
, pp. 154-169
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
-
6
-
-
79955984052
-
Diesel: Applying privilege separation to database access
-
New York: ACM Press
-
Felt A P, Finifter M, Weinberger J, et al. Diesel: Applying privilege separation to database access [C]// Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2011: 416-422.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 416-422
-
-
Felt, A.P.1
Finifter, M.2
Weinberger, J.3
-
7
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Lampson B, Abadi M, Burrows M, et al. Authentication in distributed systems: Theory and practice [J]. ACM Transactions on Computer Systems (TOCS), 1992, 10(4): 265-310.
-
(1992)
ACM Transactions on Computer Systems (TOCS)
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
-
8
-
-
84869649229
-
Trusted computing base
-
2002-02
-
Wikipedia. Trusted computing base [EB/OL]. (2002-02). http://en.wikipedia.org/wiki/Trusted_computing_base.
-
-
-
-
9
-
-
79960580686
-
Attack surface: Mitigate security risks by minimizing the code you expose to untrusted users
-
2004-11
-
Howard M. Attack surface: Mitigate security risks by minimizing the code you expose to untrusted users [EB/OL]. (2004-11). http://msdn.microsoft.com/en-us/magazine/cc163882.aspx.
-
-
-
Howard, M.1
-
10
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
McCune J M, Parno B J, Perrig A, et al. Flicker: An execution infrastructure for TCB minimization [J]. ACM SIGOPS Operating Systems Review, 2008, 42(4): 315-328.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.4
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
-
11
-
-
3242758247
-
Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC
-
Gaithersburg: US Department of Commerce, National Institute of Standards and Technology
-
Dworkin M. Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC [R]. Gaithersburg: US Department of Commerce, National Institute of Standards and Technology, 2007.
-
(2007)
-
-
Dworkin, M.1
-
12
-
-
33746355884
-
The Galois/counter mode of operation (GCM)
-
McGrew D, Viega J. The Galois/counter mode of operation (GCM) [EB/OL]. (2004). http://siswg.net/docs/gcm_spec.pdf.
-
(2004)
-
-
McGrew, D.1
Viega, J.2
-
13
-
-
84871941265
-
Block cipher mode of operation
-
Wikipedia, 2014-05
-
Wikipedia. Block cipher mode of operation [EB/OL]. (2014-05). http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation.
-
-
-
-
14
-
-
78651112791
-
Intel? carry-less multiplication instruction and its usage for computing the GCM mode, Intel white paper
-
Gueron S, Kounavis M E. Intel? carry-less multiplication instruction and its usage for computing the GCM mode, Intel white paper [R]. 2012.
-
(2012)
-
-
Gueron, S.1
Kounavis, M.E.2
-
15
-
-
84901373429
-
Usage of server-side programming languages for websites
-
W3Techs, 2014-04
-
W3Techs. Usage of server-side programming languages for websites [EB/OL]. (2014-04). http://w3techs.com/technologies/overview/programming_language/all.
-
-
-
-
16
-
-
84970888297
-
AES-GCM for efficient authenticated encryption: Ending the reign of HMAC-SHA-1?
-
Stanford: Stanford Univ
-
Gueron S. AES-GCM for efficient authenticated encryption: Ending the reign of HMAC-SHA-1? [C]// Workshop on Real-World Cryptography. Stanford: Stanford Univ, 2013.
-
(2013)
Workshop on Real-World Cryptography
-
-
Gueron, S.1
-
17
-
-
84959115909
-
vld Package Information
-
2003-09
-
The PHP Group. vld Package Information [EB/OL]. (2003-09). http://pecl.php.net/package/vld.
-
-
-
-
18
-
-
84959159916
-
Crawling Ajax-based Web Applications
-
Crawljax. 2007-10
-
Crawljax. Crawling Ajax-based Web Applications [EB/OL]. (2007-10). http://crawljax.com.
-
-
-
|