Author:
Bowers Kevin D.,Hart Catherine,Juels Ari,Triandopoulos Nikos
Publisher
Springer International Publishing
Reference26 articles.
1. Ettercap,
http://ettercap.sourceforge.net/
2. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21, 469–491 (2008)
3. Lecture Notes in Computer Science;M. Bellare,2003
4. Bowers, K.D., Hart, C., Juels, A., Triandopoulos, N.: PillarBox: Combating next-generation malware with fast forward-secure logging. Cryptology ePrint Archive, Report 2013/625 (2013)
5. Crosby, S.A., Wallach, D.S.: Efficient data structures for tamper-evident logging. In: USENIX Sec., pp. 317–334 (2009)
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献