Author:
Bauer Lujo,Garriss Scott,McCune Jonathan M.,Reiter Michael K.,Rouse Jason,Rutenbar Peter
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Abadi, M.: On SDSI’s linked local name spaces. J. Computer Security (1998)
2. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Prog. Lang. and Sys. (September 1993)
3. Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: Proc. 6th ACM Conference on Computer and Communications Security (November 1999)
4. Appel, A.W., Michael, N., Stump, A., Virga, R.: A trustworthy proof checker. J. Automated Reasoning 31(3-4), 231–260 (2003)
5. Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: Proc. 21st IEEE Symposium on Security and Privacy (2002)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mobile Embedded System;Multigenerational Online Behavior and Media Use;2019
2. SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks;Information Systems Security;2018
3. Smart Locks;Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security;2016-05-30
4. The Power of Whispering;Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security;2015-04-14
5. Predicting Severity of Software Vulnerability Based on Grey System Theory;Algorithms and Architectures for Parallel Processing;2015