메뉴 건너뛰기




Volumn , Issue , 1991, Pages 51-59

How to withstand mobile virus attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VIRUSES; VIRUSES;

EID: 85027164480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/112600.112605     Document Type: Conference Paper
Times cited : (389)

References (31)
  • 3
    • 0025137207 scopus 로고
    • The Round Complexity of Secure Protocols
    • ACM
    • Beaver D., S. Micali and P. Rogaway, The Round Complexity of Secure Protocols, STOC 1990, ACM, pp. 503-513.
    • (1990) STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 5
    • 84898960610 scopus 로고
    • Completeness Theorem for Noncryptographic Fault-tolerant Distributed Computing
    • ACM
    • Ben-Or M., S. Goldwasser and A. Wigderson, Completeness Theorem for Noncryptographic Fault-tolerant Distributed Computing, STOC 1988, ACM, pp. 1-10.
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • ACM
    • D. Chaum, C. Crepeau and I. Damgard, Multiparty Unconditionally Secure Protocols, STOC 1988, ACM, pp. 11-19.
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 9
    • 0012451287 scopus 로고    scopus 로고
    • New Models and Algorithms for Future Networks
    • I. Cidon, I. Goapl, and S. Kutten, New Models and Algorithms for Future Networks, 7th ACM PODC, pp. 75-89.
    • 7th ACM PODC , pp. 75-89
    • Cidon, I.1    Goapl, I.2    Kutten, S.3
  • 11
    • 84976834622 scopus 로고
    • Self-Stabilizing Systems in spite of Distributed Control
    • E. W. Dijkstra, Self-Stabilizing Systems in spite of Distributed Control, CACM1, 1974, pp. 643-644.
    • (1974) CACM1 , pp. 643-644
    • Dijkstra, E.W.1
  • 14
    • 0024663403 scopus 로고
    • With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
    • M. Eichin and J. Rochlis, With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988, IEEE Sym. on Security and Privacy, 1989, pp. 326-343.
    • (1989) IEEE Sym. on Security and Privacy , pp. 326-343
    • Eichin, M.1    Rochlis, J.2
  • 18
    • 85054995563 scopus 로고
    • Cryptographic Computations and the Public-Key Model
    • Springer-Verlag
    • Z. Galil, S. Haber and M. Yung, Cryptographic Computations and the Public-Key Model, The 7th Crypto 1987, Springer-Verlag, pp. 135-155.
    • (1987) The 7th Crypto , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 19
    • 0022914590 scopus 로고    scopus 로고
    • Proofs that Yield Nothing But their Validity
    • IEEE
    • O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing But their Validity, FOCS 1986, IEEE, pp. 174-187.
    • FOCS 1986 , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 20
    • 0023545076 scopus 로고
    • How to Play any Mental Poker
    • ACM
    • O. Goldreich, S. Micali and A. Wigderson, How to Play any Mental Poker, STOC 1987, ACM, pp. 218-229.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 21
    • 0021941417 scopus 로고    scopus 로고
    • The Knowledge Complexity of Interactive Proof-Systems
    • ACM
    • S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, STOC 1985, ACM, pp. 291-304.
    • STOC 1985 , pp. 291-304
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 23
    • 0023168930 scopus 로고
    • Limiting the Damage Potential of Discretionary Trojan Horses
    • P.A. Kager, Limiting the Damage Potential of Discretionary Trojan Horses, IEEE Sym. on Security and Privacy, 1987, pp. 32-37.
    • (1987) IEEE Sym. on Security and Privacy , pp. 32-37
    • Kager, P.A.1
  • 27
    • 0023207670 scopus 로고
    • The Design of an Effective Auditing Subsystem
    • J. Piccioto, The Design of an Effective Auditing Subsystem, IEEE Sym. on Security and Privacy, 1987, pp. 13-22.
    • (1987) IEEE Sym. on Security and Privacy , pp. 13-22
    • Piccioto, J.1
  • 28
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, and L. Lamport Reaching agreement in the presence of faults, JACM, 27(2), 1980.
    • (1980) JACM , vol.27 , Issue.2
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 29
  • 30
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • ACM
    • T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multiparty Protocols with Honest Majority, STOC 1989, ACM, pp. 73-85.
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.