2Dailey Paulson L.New technology beefs up BIOS.Computer,May 2004,37(5):22~23.
3Richard A,Kemmerer.Cybersecurity.In:25th International Conference on Software Engineering,Portland,Oregon USA,2003,1~11.
4Ammann.A.,Jajodia.S.,Peng Liu.A Fault Tolerance Approach to Survivability.In:Computer Security,Dependability and Assurance:From Needs to Solutions,proceedings,7-9 July 1998,York,England,11-13November,1998,Williamsburg,Virginia,1998,204~212.
5Malkin M.,Wu T.,Boneh,D.Building intrusion tolerant applications.In:DARPA Information Survivability Conference and Exposition,South Carolina,United States,Jan.2000,25~27.
6Lauter K.The advantages of elliptic curve cryptography for wireless security,Wireless Communications,IEEE[see also IEEE Personal Communications],Feb 2004 11(1):62 ~67.