-
3
-
-
0005078946
-
Entity authentication and key distribution
-
In D. Stinson, editor Springer- Verlag, LNCS
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. Stinson, editor, Proc. IEEE Crypto 93. Springer-Verlag, 1994. LNCS no. 773.
-
(1994)
Proc. IEEE Crypto
, vol.93
, Issue.773
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0001868672
-
Optimal asymmetric encryption - How to encrypt with rsa
-
A. DeSantis, editor Springer- Verlag, LNCS
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with rsa. In A. DeSantis, editor, Proc. Eurocrypt 94. Springer-Verlag, 1995. LNCS no. 950.
-
(1995)
Proc. Eurocrypt
, vol.94
, Issue.950
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
85031732185
-
Supdood? Repackaged problems for you and MMI
-
IEEE Computer Society Press
-
R. Bace and M. Schaefer. 'tsupdood? repackaged problems for you and mmi. In Proc. New Security Foundations Workshop 1995, pages 2-10. IEEE Computer Society Press, 1995.
-
(1995)
Proc. New Security Foundations Workshop 1995
, pp. 2-10
-
-
Bace, R.1
Schaefer, M.2
-
6
-
-
21844464524
-
Security and privacy to
-
March
-
D. Cooper and C. Pfleeger. Security and privacy tc. IEEE Computer, pages 118-9, March 1996.
-
(1996)
IEEE Computer
, pp. 118-119
-
-
Cooper, D.1
Pfleeger, C.2
-
7
-
-
85084163160
-
Compliance defects in public-key cryptography
-
USENIX
-
D. Davis. Compliance defects in public-key cryptography. In Proc. 6th USENIX Security Symposium, pages 171-8. USENIX, 1996.
-
(1996)
Proc. 6th USENIX Security Symposium
, pp. 171-178
-
-
Davis, D.1
-
8
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
IEEE
-
P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: Algorithms, analysis, and implications. In Proc. 1996 IEEE Symposium on Security and Privacy, pages 110-9. IEEE, 1996.
-
(1996)
Proc. 1996 IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
Forrest, P.S.1
Helman, P.2
-
12
-
-
0029716418
-
A sense of self for unix processes
-
IEEE
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff. A sense of self for unix processes. In Proc. 1996 IEEE Symposium on Security and Privacy, pages 120-8. IEEE, 1996.
-
(1996)
Proc. 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
13
-
-
0001673498
-
Mathematical notation in formal specification: Too difficult for the masses?
-
February
-
K. Finney. Mathematical notation in formal specification: Too difficult for the masses? IEEE Trans. Software Engineering, 22(2):158-9, February 1996.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.2
, pp. 158-159
-
-
Finney, K.1
-
15
-
-
0002606747
-
A biologically inspired immune system for computers
-
MIT Press, July
-
J. Kephart. A biologically inspired immune system for computers. In Artificial Life IV, pages 130-9. MIT Press, July 1994.
-
(1994)
Artificial Life
, vol.4
, pp. 130-139
-
-
Kephart, J.1
-
16
-
-
85031737803
-
Barbarians at the firewall
-
80NA3-8, September
-
D. Kerr. Barbarians at the firewall. Byte, 21(9):80NA3-8, September 1996.
-
(1996)
Byte
, vol.21
, pp. 9
-
-
Kerr, D.1
-
18
-
-
0009990437
-
Daily build and smoke test
-
July
-
S. McConnell. Daily build and smoke test. IEEE Software, 13(4): 144-3, July 1996.
-
(1996)
IEEE Software
, vol.13
, Issue.4
, pp. 144-153
-
-
McConnell, S.1
-
19
-
-
33749069296
-
-
National Computer Security Center Document NCSC-TG-004
-
National Computer Security Center. Glossary of Computer Security Terms. NCSC, 1988. Document NCSC-TG-004.
-
(1988)
Glossary of Computer Security Terms. NCSC
-
-
-
22
-
-
84962372339
-
What is a secret - And - what does that have to do with computer security
-
IEEE Computer Society Press
-
R. Nelson. What is a secret - and - what does that have to do with computer security. In Proc. New Security Paradigms Workshop, pages 74-81. IEEE Computer Society Press, 1994.
-
(1994)
Proc. New Security Paradigms Workshop
, pp. 74-81
-
-
Nelson, R.1
-
23
-
-
70450256501
-
Unhelpfulness as a security policy, or, it's about time
-
IEEE Computer Society
-
R. Nelson. Unhelpfulness as a security policy, or, it's about time. In Proc. New Security Paradigms Workshop 1995, pages 29-32. IEEE Computer Society, 1995.
-
(1995)
Proc. New Security Paradigms Workshop 1995
, pp. 29-32
-
-
Nelson, R.1
-
27
-
-
85031758687
-
Internet software problems drive home security issue
-
March
-
E. Sullivan. Internet software problems drive home security issue. PCWeek, 13(10):1, March 1996.
-
(1996)
PCWeek
, vol.13
, Issue.10
, pp. 1
-
-
Sullivan, E.1
-
29
-
-
0004186420
-
-
Shambhala Press, tr. T. Cleary
-
Sun Tzu. The Art of War. Shambhala Press, 1991. tr. T. Cleary.
-
(1991)
The Art of War
-
-
Tzu, S.1
-
32
-
-
0030405434
-
The non-technical threat to computing systems
-
I. Winkler. The non-technical threat to computing systems. Computing Systems, 9(1):3-14, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.1
, pp. 3-14
-
-
Winkler, I.1
-
33
-
-
84872678600
-
Pretty good assurance
-
IEEE Computer Society Press, 1995
-
J. Williams, M. Schacfer, and D. Landoll. Pretty good assurance. In Proc. New Security Paradigms Workshop, 1995, pages 82-89. IEEE Computer Society Press, 1995.
-
(1995)
Proc. New Security Paradigms Workshop
, pp. 82-89
-
-
Williams, J.1
Schacfer, M.2
Landoll, D.3
|