PapersButler Lampson, Protection Butler Lampson, Computer Security in the Real World Ross Anderson, Why cryptosystems fail Roger M. Needham, Denial of service Roger M. Needham, Denial of service: an example Edward Wobber, Martn Abadi, Michael Burrows, Butler Lampson, Authentication in the Taos operating system Butler Lampson, Martn Abadi, Michael Burrows, Edward Wobber, Authentication in distributed systems: theory and practice M. Bishop and M. Dilger, Checking for Race Conditions in File Accesses, Computing Systems 9(2), pp. 131-152 (Spring 1996)
RijndaelAES proposalRijmen's Rijndael page Savard's description SteganographyNiels Provos' overheadsStudy aidsW01 midterm examLecture notes covered on midterm
|