Publisher
Springer International Publishing
Reference29 articles.
1. Amoroso, E.G.: Fundamentals of Computer Security Technology, pp, 15–29. Prentice-Hall (1994) ISBN0131089293
2. Bishop, M., Dilger, M.: Checking for race conditions in file accesses. Comput. Syst. 9(2), 131–152 (1996)
3. van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of “Stealthy Takeover.” J. Cryptology 26(4), 655–713 (2013). (also in IACR Cryptology ePrint Archive, Report 2012/103, 2012)
4. Gligor, V.D., Lindsay, B.G.: Object migration and authentication. IEEE Trans. Softw. Eng. SE–5(6), 607–611 (1979)
5. Lecture Notes in Computer Science;VD Gligor,2007
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献