Author:
Chen Jian,Dai Bo,Wang Yanbo,Yao Yiyang,Li Bo
Publisher
Springer International Publishing
Reference13 articles.
1. Kim, G.H., Spafford, E.H.: Experiences with Tripwire: using integrity checkers for intrusion detection. In: System Administration, Networking and Security Conference (1994)
2. Chang, X., et al.: ZRTP-based trusted transmission of VoIP traffic and formal verification. In: IEEE International Conference on Multimedia Information Networking and Security, pp. 560–563 (2012)
3. Minmin, L., Liu, J.: A trusted transmission protocol based on trusted computing technology. In: International Conference on Computational Problem-Solving IEEE, pp. 473–476 (2012)
4. Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. SIGPLAN Not. 43(3), 2–13 (2008)
5. Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: InkTag: secure applications on an untrusted operating system. SIGPLAN Not. 48(4), 265–278 (2013)