Establishing the Genuinity of Remote Computer Systems.
Rick KennellLeah H. JamiesonPublished in: USENIX Security Symposium (2003)
Keyphrases
- computer systems
- data processing
- hardware and software
- operating system
- communication systems
- computing systems
- information systems
- computer networks
- computer technology
- computer architecture
- human beings
- information processing systems
- computer security
- real time
- software developers
- intrusion detection system
- artificial intelligence