메뉴 건너뛰기




Volumn Part F129440, Issue , 1996, Pages 2-16

The emperor's old armor

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85029644174     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/304851.304855     Document Type: Conference Paper
Times cited : (39)

References (33)
  • 3
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • In D. Stinson, editor Springer- Verlag, LNCS
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. Stinson, editor, Proc. IEEE Crypto 93. Springer-Verlag, 1994. LNCS no. 773.
    • (1994) Proc. IEEE Crypto , vol.93 , Issue.773
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption - How to encrypt with rsa
    • A. DeSantis, editor Springer- Verlag, LNCS
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with rsa. In A. DeSantis, editor, Proc. Eurocrypt 94. Springer-Verlag, 1995. LNCS no. 950.
    • (1995) Proc. Eurocrypt , vol.94 , Issue.950
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 85031732185 scopus 로고
    • Supdood? Repackaged problems for you and MMI
    • IEEE Computer Society Press
    • R. Bace and M. Schaefer. 'tsupdood? repackaged problems for you and mmi. In Proc. New Security Foundations Workshop 1995, pages 2-10. IEEE Computer Society Press, 1995.
    • (1995) Proc. New Security Foundations Workshop 1995 , pp. 2-10
    • Bace, R.1    Schaefer, M.2
  • 6
    • 21844464524 scopus 로고    scopus 로고
    • Security and privacy to
    • March
    • D. Cooper and C. Pfleeger. Security and privacy tc. IEEE Computer, pages 118-9, March 1996.
    • (1996) IEEE Computer , pp. 118-119
    • Cooper, D.1    Pfleeger, C.2
  • 7
    • 85084163160 scopus 로고    scopus 로고
    • Compliance defects in public-key cryptography
    • USENIX
    • D. Davis. Compliance defects in public-key cryptography. In Proc. 6th USENIX Security Symposium, pages 171-8. USENIX, 1996.
    • (1996) Proc. 6th USENIX Security Symposium , pp. 171-178
    • Davis, D.1
  • 8
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis, and implications
    • IEEE
    • P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: Algorithms, analysis, and implications. In Proc. 1996 IEEE Symposium on Security and Privacy, pages 110-9. IEEE, 1996.
    • (1996) Proc. 1996 IEEE Symposium on Security and Privacy , pp. 110-119
    • Forrest, P.S.1    Helman, P.2
  • 13
    • 0001673498 scopus 로고    scopus 로고
    • Mathematical notation in formal specification: Too difficult for the masses?
    • February
    • K. Finney. Mathematical notation in formal specification: Too difficult for the masses? IEEE Trans. Software Engineering, 22(2):158-9, February 1996.
    • (1996) IEEE Trans. Software Engineering , vol.22 , Issue.2 , pp. 158-159
    • Finney, K.1
  • 15
    • 0002606747 scopus 로고
    • A biologically inspired immune system for computers
    • MIT Press, July
    • J. Kephart. A biologically inspired immune system for computers. In Artificial Life IV, pages 130-9. MIT Press, July 1994.
    • (1994) Artificial Life , vol.4 , pp. 130-139
    • Kephart, J.1
  • 16
    • 85031737803 scopus 로고    scopus 로고
    • Barbarians at the firewall
    • 80NA3-8, September
    • D. Kerr. Barbarians at the firewall. Byte, 21(9):80NA3-8, September 1996.
    • (1996) Byte , vol.21 , pp. 9
    • Kerr, D.1
  • 18
    • 0009990437 scopus 로고    scopus 로고
    • Daily build and smoke test
    • July
    • S. McConnell. Daily build and smoke test. IEEE Software, 13(4): 144-3, July 1996.
    • (1996) IEEE Software , vol.13 , Issue.4 , pp. 144-153
    • McConnell, S.1
  • 19
    • 33749069296 scopus 로고
    • National Computer Security Center Document NCSC-TG-004
    • National Computer Security Center. Glossary of Computer Security Terms. NCSC, 1988. Document NCSC-TG-004.
    • (1988) Glossary of Computer Security Terms. NCSC
  • 22
    • 84962372339 scopus 로고
    • What is a secret - And - what does that have to do with computer security
    • IEEE Computer Society Press
    • R. Nelson. What is a secret - and - what does that have to do with computer security. In Proc. New Security Paradigms Workshop, pages 74-81. IEEE Computer Society Press, 1994.
    • (1994) Proc. New Security Paradigms Workshop , pp. 74-81
    • Nelson, R.1
  • 23
    • 70450256501 scopus 로고
    • Unhelpfulness as a security policy, or, it's about time
    • IEEE Computer Society
    • R. Nelson. Unhelpfulness as a security policy, or, it's about time. In Proc. New Security Paradigms Workshop 1995, pages 29-32. IEEE Computer Society, 1995.
    • (1995) Proc. New Security Paradigms Workshop 1995 , pp. 29-32
    • Nelson, R.1
  • 27
    • 85031758687 scopus 로고    scopus 로고
    • Internet software problems drive home security issue
    • March
    • E. Sullivan. Internet software problems drive home security issue. PCWeek, 13(10):1, March 1996.
    • (1996) PCWeek , vol.13 , Issue.10 , pp. 1
    • Sullivan, E.1
  • 29
    • 0004186420 scopus 로고
    • Shambhala Press, tr. T. Cleary
    • Sun Tzu. The Art of War. Shambhala Press, 1991. tr. T. Cleary.
    • (1991) The Art of War
    • Tzu, S.1
  • 32
    • 0030405434 scopus 로고    scopus 로고
    • The non-technical threat to computing systems
    • I. Winkler. The non-technical threat to computing systems. Computing Systems, 9(1):3-14, 1996.
    • (1996) Computing Systems , vol.9 , Issue.1 , pp. 3-14
    • Winkler, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.