H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal
trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
S. Maffeis, J. Mitchell, and A.
Taly. Object capabilities and isolation of untrusted web applications. In Security
and Privacy (SP), 2010 IEEE Symposium on, pages 125–140, 2010.
D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping,"
In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.
S.-T. Sun and K. Beznosov. The devil is in the
(implementation) details: an empirical analysis of oauth sso systems. In Proceedings
of ACM conference on Computer and communications security, 2012.
A. Back, "Hashcash - a denial of service counter-measure,"
http://www.hashcash.org/papers/hashcash.pdf, 2002
D. Silver, S. Jana, E. Chen, C.
Jackson, and D. Boneh. Password managers: Attacks and defenses. In Proceedings
of the 23rd Usenix Security Symposium, 2014.
W. Zeller and E. W. Felten.
Cross-site request forgeries: Exploitation and prevention. Technical report,
Princeton University, 2008.
LIE, D., THEKKATH, C. A.,
MITCHELL, M., LINCOLN, P., BONEH, D., MITCHELL, J., AND HOROWITZ, M.
Architectural support for copy and tamper resistant software. In Symp. On Architectural
Support for Programming Languages and Operating Systems (2000), pp. 168–177.
K. Borders, X. Zhao, and A. Prakash. Siren:
Catching Evasive Malware (Short Paper). In S&P (Oakland), pages 78–85,
2006.
This is very interesting and informative knowledge that you provide about essay writing for admission your experience is significant for student.
ReplyDeleteDissertation Proposal