WHY CRYPTOSYSTEMS FAIL

被引:109
作者
ANDERSON, RJ
机构
[1] Cambridge University, Cambridge
关键词
D O I
10.1145/188280.188291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:32 / 40
页数:9
相关论文
共 22 条
[1]  
ABADI M, 1994, DEC SRC125 TECH REP
[2]  
ANDERSON RJ, 1993 P ACM C COMP CO, P215
[3]  
ANDERSON RJ, LECTURE NOTES COMPUT, V648, P411
[4]  
ANDERSON RJ, 1993, IN PRESS 4TH P IMA C
[5]   INFORMATION-SYSTEMS SECURITY DESIGN METHODS - IMPLICATIONS FOR INFORMATION-SYSTEMS DEVELOPMENT [J].
BASKERVILLE, R .
COMPUTING SURVEYS, 1993, 25 (04) :375-414
[6]  
BOYD C, PREPROCEEDINGS EUROC, V93, pT88
[7]  
Brooks Frederick P., 1975, MYTHICAL MAN MONTH
[8]  
BULL JA, LECTURE NOTES COMPUT, V648, P3
[9]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[10]  
BUTLER RW, 1991, DEC P ACM S SOFTW CR, P66