Secure Audit Logs
Alessandro Orso,David Naccache,David Brumley,Yvo Desmedt,Nabil Adam,Haibing Lu,Jaideep Vaidya,Basit Shafiq,Goce Jakimoski,Anne Canteaut, Anton Stiglic, Wesley M. Eddy,Carlisle Adams,Mark Stephens,Ernst M. Gabidulin,Dan Boneh,Mike Just,Claudio A. Ardagna, Ernesto Damiani,Caroline Fontaine,Paul England, Ali Bagherzandi,Bijit Hore,Sharad Mehrotra,Bart Preneel,Laurent Bussard, G. R. Blakley, Gregory Kabatiansky,Gerardo Pelosi,Sangwon Hyun,Peng Ning,Sean W. Smith,Wensheng Zhang,Radu Sion,Ming Li,Wenjing Lou,Kui Ren, Marc Vauclair,Donggang Liu,Keith B Frikken,Cristina Nita-Rotaru,Reza Curtmola,Jing Dong,Qijun Gu, Clemens Heinrich,Kun Sun,Panos Papadimitratos,Jean-Pierre Hubaux, Friedrich L. Bauer,Marijke DeSoete, Tom Caddy,Sachiko Yoshihama,Tae Oh, Shinyoung Lim,Young B. Choi,Jungwoo Ryoo, Jung-Min “Jerry” Park, Kaigui Bian,Srdjan Capkun,Mehdi Tibouchi,Russ Housley, Gerrit Bleumer,Caroline Fontain,Kazue Sako,Yi Yang,Sencun Zhu,Marijke De Soete,Mary Ellen Zurko, Richard T. Simon,Tor Helleseth,Christophe De Cannière,Martin Johns,Helena Handschuh, Henk C. A. van Tilborg,Daniele Micciancio,Marc Joye, Francis Olivier, Burt Kaliski,Emmanuel Thome,Berry Schoenmakers,Patrizio Campisi,Emanuele Maiorana,Alessandro Neri,Yevgeniy Dodis,Bodo Möller,Alex Biryukov,Markus Kuhn,Kim Nguyen, Mary J. Culnan,Bruce Schneier,Brent Byung Hoon Kang,Gautam Singaraju, Homayoon Beigi,Christof Paar, Carl M. Ellison,Nary Subramanian,Sabrina De Capitani di Vimercati,Giovanni Livraga
Encyclopedia of Cryptography and Security (2nd Ed.)(2011)
引用 0|浏览14
关键词
Audit,Computer science,Operations management
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要