Now showing items 1-2 of 2

    • Remote booting in a hostile world: to whom am I speaking? [Computer security] 

      Lomas, M.; Christianson, B. (1995)
      Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in ...
    • To whom am I speaking? Remote booting in a hostile world 

      Lomas, M.; Christianson, B. (University of Hertfordshire, 1994)
      We consider the problem of booting a workstation across a network. We allow "maintenance" (that is, change without notice by untrusted parties such as adversaries and system managers) to be freely performed upon the network, ...