메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Side effects are not sufficient to authenticate software

Author keywords

[No Author keywords available]

Indexed keywords

ON-MACHINES; REMOTE MACHINES; SIDE EFFECT; SUBSTITUTION ATTACK; TRUSTED HARDWARES; TRUSTED SOFTWARES;

EID: 85084162788     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (55)

References (13)
  • 6
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • USENIX Association
    • Rick Kennell and Leah H. Jamieson. Establishing the genuinity of remote computer systems. In 12th USENIX Security Symposium, pages 295-310. USENIX Association, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 295-310
    • Kennell, R.1    Jamieson, L.H.2
  • 7
    • 85013591309 scopus 로고
    • On the self-similar nature of ethernet traffic
    • Deepinder P. Sidhu, editor San Francisco, California
    • Will E. Leland, Murad S. Taqq, Walter Willinger, and Daniel V. Wilson. On the self-similar nature of Ethernet traffic. In Deepinder P. Sidhu, editor, ACM SIGCOMM, pages 183-193, San Francisco, California, 1993.
    • (1993) ACM SIGCOMM , pp. 183-193
    • Leland, W.E.1    Taqq, M.S.2    Willinger, W.3    Wilson, D.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.