Computer Security
COMPSCI 590
Spring 2019
Reading
References
Papers
- "The Akamai network: a platform for high-performance Internet applications," E. Nygren, Ramesh K. Sitaraman, and J. Sun, ACM SIGOPS
Operating Systems Review, Volume 44 Issue 3, July 2010. [PDF]
- "A Blueprint for Building a Quantum Computer," R. Van Meter and C. Horsman, Communications of the ACM, Volume 56, Number 10, October 2013,
pages 84-93. [Link]
- "Jumpstarting BGP Security with Path-End Validation," Avichai Cohen, Yossi Gilad, Amir Herzberg, and Michael Schapira. SIGCOMM 16. [Link]
- "Why Is It Taking So Long
to Secure Internet Routing?" Sharon Goldberg, Boston University. [Link]
- "Bitcoin: A Peer-to-Peer Electronic Cash System", Satoshi Nakamoto [PDF]
- "Bitter to Better - How to Make Bitcoin a Better Currency", Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun, FC 2012 [PDF]
- "Information Propagation in the Bitcoin Network", Christian Decker, Roger Wattenhofer. 13-th IEEE International Conference on Peer-to-Peer Computing [PDF]
- "Tor: The Second-Generation Onion Router", Roger Dingledine, Nick Mathewson, and Paul Syverson, SSYM 2004 [PDF]
- "The ten-page introduction to Trusted Computing", Andrew Martin, 2008 [PDF]
- "Click Trajectories: End-to-End Analysis of the
Spam Value Chain", SP 2011 [PDF]
- "On the Spam Campaign Trail", LEET 2008
[LINK]
RFC
- Transport Layer Security (TLS): RFC5246
- The Secure Shell (SSH): RFC4253
- Kerberos Network Authentication Service (Kerberos): RFC4120
- The MD5 Message-Digest Algorithm (MD5): RFC1321
page top