共 50 条
- [21] An architecture for an adaptive intrusion-tolerant server SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
- [22] Secure intrusion-tolerant replication on the Internet INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [23] Randomized intrusion-tolerant asynchronous services DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
- [24] An architecture for adaptive intrusion-tolerant applications SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
- [25] Building intrusion-tolerant secure software CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
- [26] An intrusion-tolerant password authentication system 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
- [28] A lightweight intrusion-tolerant overlay network NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
- [29] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network 2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552