메뉴 건너뛰기




Volumn , Issue , 2003, Pages 295-310

Establishing the genuinity of remote computer systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COMPUTER NETWORKS; NETWORK SECURITY; REMOTE CONTROL;

EID: 85028170979     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (155)

References (50)
  • 1
    • 84975126478 scopus 로고    scopus 로고
    • Trusted Computing Platform Aliance. TCPA main specification. http://www.trustedcomputing.org/.
    • TCPA Main Specification
  • 4
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA
    • August
    • William A. Arbaugh. Improving the TCPA. IEEE Computer, 35:77-79, August 2002.
    • (2002) IEEE Computer , vol.35 , pp. 77-79
    • Arbaugh, W.A.1
  • 7
    • 0002454352 scopus 로고
    • Some efficient architecture simulation techniques
    • Berkeley, CA USENIX Association
    • R. Bedichek. Some efficient architecture simulation techniques. In Proceedings of the USENIX Winter 1990 Technical Conference, pages 53-64, Berkeley, CA, 1990. USENIX Association.
    • (1990) Proceedings of the USENIX Winter 1990 Technical Conference , pp. 53-64
    • Bedichek, R.1
  • 8
    • 0028288854 scopus 로고
    • An attack on the interlock protocol when used for authentication
    • January
    • S. M. Bellovin and M. Merritt. An attack on the interlock protocol when used for authentication. IEEE Transactions on Information Theory, 40(1):273-275, January 1994.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 273-275
    • Bellovin, S.M.1    Merritt, M.2
  • 11
    • 0028533131 scopus 로고
    • Bits: A smartcard protected operating system
    • November
    • Paul C. Clark and Lance J. Hoffman. Bits: A smartcard protected operating system. Communications of the ACM, 37(11):66-94, November 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 66-94
    • Clark, P.C.1    Hoffman, L.J.2
  • 19
    • 85077747018 scopus 로고    scopus 로고
    • Free Software Foundation. GNU GRUB. http://www.gnu.org/software/grub/grub.html, 2003.
    • (2003) GNU GRUB
  • 20
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In CT-RSA, pages 425-440, 2001.
    • (2001) CT-RSA , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 21
    • 0010902349 scopus 로고
    • The protection of computer software: Its technology and applications
    • chapter Program Identification. Cambridge University Press, second edition
    • D. Grover. The protection of computer software: Its technology and applications. In The British Computer Society Monographs in Informatics, chapter Program Identification. Cambridge University Press, second edition, 1992.
    • (1992) The British Computer Society Monographs in Informatics
    • Grover, D.1
  • 23
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Fritz Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. Lecture Notes in Computer Science, 1419:92-113, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 28
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • November
    • Steven Kent and Randall Atkinson. Security architecture for the internet protocol. IETF RFC 2401, November 1998.
    • (1998) IETF RFC 2401
    • Kent, S.1    Atkinson, R.2
  • 35
    • 0141745451 scopus 로고    scopus 로고
    • fall keynote speech.
    • Paul Otellini. Intel developer forum, fall 2002, keynote speech. http://www.intel.com/pressroom/archive/speeches/otellini20020909.htm.
    • (2002) Intel Developer Forum
    • Otellini, P.1
  • 36
    • 85077755152 scopus 로고    scopus 로고
    • Etherboot Project. Etherboot. http://www.etherboot.org/, 2003.
    • (2003) Etherboot
  • 39
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • April
    • Ronald L. Rivest and Adi Shamir. How to expose an eavesdropper. Communications of the ACM, 27(4):393-395, April 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.4 , pp. 393-395
    • Rivest, R.L.1    Shamir, A.2
  • 40
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel pentium's ability to support a secure virtual machine monitor
    • USENIX Association
    • John Scott Robin and Cynthia E Irvine. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. In Proceedings of the 9th USENIX Security Symposium. USENIX Association, 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium
    • Robin, J.S.1    Irvine, C.E.2
  • 41
    • 12244250631 scopus 로고    scopus 로고
    • October
    • David Safford. The need for TCPA. http://www.research.ibm.com/gsal/tcpa/why-tcpa.pdf, October 2002.
    • (2002) The Need for TCPA
    • Safford, D.1
  • 44
    • 84958045366 scopus 로고    scopus 로고
    • Using a high-performance, programmable secure coprocessor
    • Sean W Smith, Elaine R. Palmer, and Steve Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89,1998.
    • (1998) Financial Cryptography , pp. 73-89
    • Smith, S.W.1    Palmer, E.R.2    Weingart, S.3
  • 45
    • 84960561455 scopus 로고
    • On computable numbers: With an application to the entscheidungs problem
    • A.M Turing. On computable numbers: With an application to the entscheidungs problem. Proceedings of the London Mathematical Society, 42:230-265, 1936.
    • (1936) Proceedings of the London Mathematical Society , vol.42 , pp. 230-265
    • Turing, A.M.1
  • 47
    • 0031274275 scopus 로고    scopus 로고
    • Software reliability via run-time result-checking
    • Hal Wasserman and Manuel Blum. Software reliability via run-time result-checking. Journal of the ACM, 44(6):826-849,1997.
    • (1997) Journal of the ACM , vol.44 , Issue.6 , pp. 826-849
    • Wasserman, H.1    Blum, M.2
  • 50
    • 0004196480 scopus 로고
    • PhD thesis, Carnegie Mellon University, May
    • Bennet Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.