Computer Security

COMPSCI 590

Spring 2019

Reading

References

Papers

  • "The Akamai network: a platform for high-performance Internet applications," E. Nygren, Ramesh K. Sitaraman, and J. Sun, ACM SIGOPS Operating Systems Review, Volume 44 Issue 3, July 2010. [PDF]
  • "A Blueprint for Building a Quantum Computer," R. Van Meter and C. Horsman, Communications of the ACM, Volume 56, Number 10, October 2013, pages 84-93. [Link]
  • "Jumpstarting BGP Security with Path-End Validation," Avichai Cohen, Yossi Gilad, Amir Herzberg, and Michael Schapira. SIGCOMM 16. [Link]
  • "Why Is It Taking So Long to Secure Internet Routing?" Sharon Goldberg, Boston University. [Link]
  • "Bitcoin: A Peer-to-Peer Electronic Cash System", Satoshi Nakamoto [PDF]
  • "Bitter to Better - How to Make Bitcoin a Better Currency", Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun, FC 2012 [PDF]
  • "Information Propagation in the Bitcoin Network", Christian Decker, Roger Wattenhofer. 13-th IEEE International Conference on Peer-to-Peer Computing [PDF]
  • "Tor: The Second-Generation Onion Router", Roger Dingledine, Nick Mathewson, and Paul Syverson, SSYM 2004 [PDF]
  • "The ten-page introduction to Trusted Computing", Andrew Martin, 2008 [PDF]
  • "Click Trajectories: End-to-End Analysis of the Spam Value Chain", SP 2011 [PDF]
  • "On the Spam Campaign Trail", LEET 2008 [LINK]

RFC

  • Transport Layer Security (TLS): RFC5246
  • The Secure Shell (SSH): RFC4253
  • Kerberos Network Authentication Service (Kerberos): RFC4120
  • The MD5 Message-Digest Algorithm (MD5): RFC1321

page top