Author:
de SÁ Vinícius G.P.,Boccardo Davidson R.,Rust Luiz Fernando,Machado Raphael C.S.
Subject
Computer Science Applications,General Mathematics,Software
Reference9 articles.
1. M. Bellare and P. Rogaway, Random oracles are practical : a paradigm for designing efficient protocols.Proc. 1st ACM conference on Computer and communications security(1993) 62–73.
2. A. Menezes, P. van Oorschot and S. Vanstone,Handbook of Applied Cryptography. CRC Press, USA (1996).
3. B. Preneel, Hash functions and MAC algorithms based on block cyphers, inCryptography and Coding, 6th IMA International Conference. Lect. Notes Comput. Sci.1355(1997) 270–282.
4. A. Seshadri, A. Perrig, L. van Doorn and P. Khosla, Swatt : Software-based attestation for embedded devices, in 2004.IEEE Symposium on Security and Privacy. Los Alamitos, CA (2004) 272.
5. Seshadri A., Luk M., Shi E., Perrig A., van Doorn L. and Khosla P., Pioneer : verifying code integrity and enforcing untampered code execution on legacy systems.SIGOPS Oper. Syst. Rev.39(2005) 1–16.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献