A note on denial-of-service in operating systems
IEEE Transactions on Software Engineering
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
A Specification and Verification Method for Preventing Denial of Service
IEEE Transactions on Software Engineering
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
On Denial-of-Service in Computer Networks
Proceedings of the Second International Conference on Data Engineering
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
ACM SIGOPS Operating Systems Review
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
The multics system: an examination of its structure
The multics system: an examination of its structure
A "Paradoxical" Solution To The Signature Problem
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Hi-index | 0.00 |