2Miller B P,Koski D,Lee C P,et al. Fuzz Revisited: A Re-exami-nation of the Reliability of UNIX Utilities and Services : [Technical report, CS-TR-95-1268]. Computer Sciences Department, University of Wisconsin, April 1995.
3Lee W,Stolfo S J. Data mining approaches for intrusion detection.In:Proc. of the 7th USENIX Security Symposium, 1998.
4Sandberg R,Goldberg D, Kleimann S, Walsh D, Lyon B. Design and implementation of the Sun Network Filesystem. USENIX Association Conf. Proc. June 1985. 119-130.
5McCanne S, Jacobson V. The BSD Packet Filter:a new architecture for user-level packet capture. In: Proc. of the 1993 winter USENIX conf. San Diego CA, 1993. 259-269.
6Cattaneo G,Catuogno L,Sorbo A D,Persiano P. The Design and Implementation of a Transparent Cryptographic File System for UNIX. USENIX Annual Technical Conf. 2001, Freenix Track.(Boston MA, June 29, 2001).
7Blaze M. A Cryptographic File System for Unix. First ACM Conference on Communication and Computing Security, Fairfax VA 1993. 158-165.
8Diffie W, Hellman M E. New Directions in Cryptography. IEEE Transactions on Information Theory, 1976 ,IT-22(6) : 644-654.
9Rabin M O. Digital Signatures. Foundations of Secure Communication, New York: Academic Press. 1978. 155-168.
10Schaumuller-Bichl. On the Design and Analysis od New Cipher Systems Related to the DES: [Technical Report]. Linz University, May 1981.