Security List of important publications in computer science




1 security

1.1 anonymity systems
1.2 cryptography
1.3 passwords
1.4 system security
1.5 usable security





security
anonymity systems

david chaum. untraceable electronic mail, return addresses, , digital pseudonyms. communications of acm, 4(2):84–88, february 1981.
dingledine , mathewson, anonymity loves company: usability , network effect, workshop on economics of information security (weis) 2006

cryptography


whitfield diffie , martin e. hellman, new directions in cryptography, ieee transactions on information theory, november 1976
r. l. rivest , a. shamir , l. m. adelman, method obtaining digital signatures , public-key cryptosystems, mit/lcs/tm-82, 1977
merkle, r. security, authentication, , public key systems, phd thesis, 1979 stanford university. (just read chapter 2, pages 11–15, in merkle invents cryptographic hash functions.)

passwords

morris, robert , thompson, ken. password security: case history, communications of acm cacm homepage archive volume 22 issue 11, nov. 1979 pages 594-597. pdf
mazurek et al., measuring password guessability entire university, ccs 13 proceedings of 2013 acm sigsac conference on computer & communications security, pages 173-186

system security

saltzer , schroeder, protection of information in computer systems, acm symposium on operating system principles (october 1973) html html2
karger , schell, thirty years later: lessons multics security evaluation, acsac 2002
lamport, butler. note on confinement problem, communications of acm, 16:10 (oct. 1973), pp. 613–615. pdf
thompson, reflections on trusting trust, communications of acm, 27:8, aug 1984
j.e. forrester , b.p. miller, empirical study of robustness of windows nt applications using random testing, 4th usenix windows systems symposium, seattle, august 2000.
zissis d , lekkas d, addressing cloud computing security issues, future generation computer systems, 28/3, pp. 583-592, elsevier 2012

usable security

whitten, alma, why johnny can t encrypt: usability evaluation of pgp 5.0, proceedings of 8th conference on usenix security symposium, volume 8, pages 14–28
garfinkel, simson , shelat, abhi, remembrance of data passed, ieee security , privacy, volume 1 issue 1, january 2003, page 17-27






Comments

Popular posts from this blog

Discography Neuronium

Discography E-Rotic

Deep sea mining Marine pollution