Physical security devices for computer subsystems: A survey of attacks and defenses
SH Weingart - … Workshop on Cryptographic Hardware and Embedded …, 2000 - Springer
As the value of data on computing systems increases and operating systems become more
secure, physical attacks on computing systems to steal or modify assets become more likely …
secure, physical attacks on computing systems to steal or modify assets become more likely …
[图书][B] The digital dilemma: Intellectual property in the information age
National Research Council… - 2000 - books.google.com
Imagine sending a magazine article to 10 friends-making photocopies, putting them in
envelopes, adding postage, and mailing them. Now consider how much easier it is to send …
envelopes, adding postage, and mailing them. Now consider how much easier it is to send …
Establishing business rules for inter-enterprise electronic commerce
V Ungureanu, NH Minsky - International Symposium on Distributed …, 2000 - Springer
Conventional mechanisms for electronic commerce provide strong means for securing
transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they …
transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they …
Secure coprocessor integration with Kerberos V5
N Itoi - 9th USENIX Security Symposium (USENIX Security 00), 2000 - usenix.org
The nightmare of Trusted Third Party (T3P) based protocol users is compromise of the T3P.
Because the compromised T3P can read and modify any user information, the entire user …
Because the compromised T3P can read and modify any user information, the entire user …
[PDF][PDF] Mobile agents and telcos' nightmares
J Posegga, G Karjoth - Annales des télécommunications, 2000 - academia.edu
The paper analyses the current state-of-the-art of mobile agents technology wrt security,
seen from the standpoint of a public network operator (PNO). It is argued that the current …
seen from the standpoint of a public network operator (PNO). It is argued that the current …
[PDF][PDF] WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions
SW Smith - Research Report, 2000 - Citeseer
This report describes a project that aims to fill two gaps in recent security and privacy
research. The first gap is trust. Too often,“security of Web transactions” reduces to …
research. The first gap is trust. Too often,“security of Web transactions” reduces to …
History based distributed filtering-a tagging approach to network-level access control
R Sailer, M Kabatnik - Proceedings 16th Annual Computer …, 2000 - ieeexplore.ieee.org
Discusses a network-level access control technique that applies the non-discretionary
access control model to individual data packets that are exchanged between hosts or …
access control model to individual data packets that are exchanged between hosts or …
[图书][B] Improving DES Hardware Throughput for Short Operations
M Lindemann, SW Smith - 2000 - Citeseer
IBM Research Report Page 1 RC 21798 Log 98050 07 31 2000 Computer Science
Mathematics IBM Research Report Improving DES Hardware Throughput for Short Operations …
Mathematics IBM Research Report Improving DES Hardware Throughput for Short Operations …
[图书][B] The use of safe areas of computation (SAC) for secure computing
ALM Dos Santos - 2000 - search.proquest.com
Currently the computer systems and software used by the average user offer virtually no
security. Because of this many attacks, both simulated and real, have been described by the …
security. Because of this many attacks, both simulated and real, have been described by the …
[PDF][PDF] Practical Private Information Retrieval with Secure Coprocessors
AABDH TJ, WT Zurich - Citeseer
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that the this access is completely private—even to the operator of this …
in a way that ensures that the this access is completely private—even to the operator of this …