Security of Internet location management, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.78-87, 2002. ,
DOI : 10.1109/CSAC.2002.1176281
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9022
Mobile agent security, Electronics & Communication Engineering Journal, vol.14, issue.5, pp.211-218, 2002. ,
DOI : 10.1049/ecej:20020504
Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.226-236, 2002. ,
DOI : 10.1145/513800.513828
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, p.OSDI, 2002. ,
DOI : 10.1145/844128.844156
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987. ,
DOI : 10.1109/SP.1987.10001
PIC: practical Internet coordinates for distance estimation, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.178-187, 2004. ,
DOI : 10.1109/ICDCS.2004.1281582
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4466
Vivaldi: a decentralized network coordinate system, In: ACM SIGCOMM. pp, pp.15-26, 2004. ,
Java security: from HotJava to Netscape and beyond, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.190-200, 1996. ,
DOI : 10.1109/SECPRI.1996.502681
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.8361
Authentication by correspondence, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.88-95, 2003. ,
DOI : 10.1109/JSAC.2002.806132
Protecting browsers from DNS rebinding attacks, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.421-431, 2007. ,
DOI : 10.1145/1315245.1315298
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8059
(Somewhat) breaking the same-origin policy by undermining DNS pinning. Posting to the Bug Traq mailing list, 2006. ,
Securing internet coordinate embedding systems, In: ACM SIGCOMM, 2007. ,
DOI : 10.1145/1282427.1282388
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.8371
Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
Toward a New Framework for Information Security?, 2002. ,
DOI : 10.1002/9781118851678.ch3
Veracity: Practical secure network coordinates via vote-based agreements, USENIX Annual Technical Conference (USENIX- ATC). USENIX, 2009. ,
Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts, Advances in Cryptology -Eurocrypt'88, pp.35-43, 1988. ,
DOI : 10.1007/3-540-45961-8_4