共 50 条
- [21] An intrusion-tolerant password authentication system [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
- [22] A lightweight intrusion-tolerant overlay network [J]. NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
- [25] A novel intrusion-tolerant approach for Internet access [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +
- [26] BackupIT: An Intrusion-Tolerant Cooperative Backup System [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
- [27] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems [J]. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
- [28] On the effects of finite memory on intrusion-tolerant systems [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
- [29] On the correctness of an intrusion-tolerant group communication protocol [J]. CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246