Computer viruses: theory and experiments
Computers and Security
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A cryptographic checksum for integrity protection
Computers and Security
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Communications of the ACM
A software authentication system for information integrity
Computers and Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and data security
Cryptography and data security
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
Current PC security tools were designed primarily for stand-alone systems. Distributed systems, in which multiple PC users access multiple resources over interconnected networks (LANs, WANs, etc.), is the current trend of applications. The already difficult job of securing the PC is getting even more difficult. With recent advancement of cryptographic research, cryptography did more than just manipulates data to turn meaningful message into nonsense to provide data security. Cryptography can also provide solutions for many different applications. In this paper, security problems for PC/workstation will be briefly discussed. Then we will address those cryptographic applications for PCs.