메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 425-438

Maintaining security in the presence of transient faults

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RANDOM PROCESSES; VIRUSES;

EID: 84984842401     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_38     Document Type: Conference Paper
Times cited : (58)

References (18)
  • 2
    • 0027617333 scopus 로고
    • Systematic design of a family of attack-resistant authentication protocols
    • June, Special issue on Secure Communications. See also a different version in Crypto 91
    • Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679–693, June 1993. Special issue on Secure Communications. See also a different version in Crypto 91.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 679-693
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 3
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password based protocol secure against dictionary attacks and password file compromise
    • November
    • Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and password file compromise. In 1st ACM Conference on Computer and Communications Security, pages 244–250, November 1993.
    • (1993) 1St ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 85028760121 scopus 로고
    • A reconstructible proactive pseudorandomness protocol
    • June
    • Chee-Seng Chow and Amir Herzberg. A reconstructible proactive pseudorandomness protocol. Work in progress, June 1994.
    • (1994) Work in Progress
    • Chow, C.-S.1    Herzberg, A.2
  • 6
    • 0024663403 scopus 로고
    • With microscope and tweezers: An analysis of the internet virus of november 1988
    • M. Elchin and J. Rochlis. With microscope and tweezers: An analysis of the internet virus of november 1988. In IEEE Symp. on Security and Privacy, pages 326–343, 1989.
    • (1989) IEEE Symp. on Security and Privacy , pp. 326-343
    • Elchin, M.1    Rochlis, J.2
  • 8
    • 0027805770 scopus 로고
    • Eavesdropping games: A graph-theoretic approach to privacy in distributed systems
    • November
    • Mat Franklin and Moti Yung. Eavesdropping games: A graph-theoretic approach to privacy in distributed systems. In 34th Annual Symposium on Foundations of Computer Science, pages 670–679, November 1993.
    • (1993) 34Th Annual Symposium on Foundations of Computer Science , pp. 670-679
    • Franklin, M.1    Yung, M.2
  • 9
    • 85028763214 scopus 로고
    • Reaching (And maintaining) agreement in the presence of mobile faults
    • Juan A. Garay. Reaching (and maintaining) agreement in the presence of mobile faults. To be presented in WDAG, 1994.
    • (1994) To Be Presented in WDAG
    • Garay, J.A.1
  • 11
    • 0022793132 scopus 로고
    • How to construct random functions
    • Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 33(4):792–807, 1986. Extended abstract in FOCS84.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 13
    • 0027544247 scopus 로고
    • Beyond preliminary analysis of the wank and oilz worms: A case of study of malicious code
    • Thomas A. Longstaff and Schultz E. Eugene. Beyond preliminary analysis of the wank and oilz worms: A case of study of malicious code. Computers and Security, 12(1):61–77, 1993.
    • (1993) Computers and Security , vol.12 , Issue.1 , pp. 61-77
    • Longstaff, T.A.1    Eugene, S.E.2
  • 15
    • 0018543411 scopus 로고
    • Unix password security
    • R. H. Morris and K. Thompson. Unix password security. Comm. ACM, 22(11):594–597, November 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.H.1    Thompson, K.2
  • 17
    • 0020495044 scopus 로고
    • A new solution to the byzantine generals problem
    • R. Reischuk. A new solution to the byzantine generals problem. Information and Control, pages 23–42, 1985.
    • (1985) Information and Control , pp. 23-42
    • Reischuk, R.1
  • 18
    • 0024130658 scopus 로고
    • How secure are computers in the u.S.a.?
    • Cliff Stoll. How secure are computers in the u.s.a.? Computers and Security, 7(6):543–547, 1988
    • (1988) Computers and Security , vol.7 , Issue.6 , pp. 543-547
    • Stoll, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.