-
1
-
-
0001916468
-
Mach: A new kernel foundation for UNIX development
-
July
-
M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A new kernel foundation for UNIX development. In Proceedings of Summer Usenix, pages 93-113, July 1986.
-
(1986)
Proceedings of Summer Usenix
, pp. 93-113
-
-
Accetta, M.J.1
Baron, R.V.2
Bolosky, W.3
Golub, D.B.4
Rashid, R.F.5
Tevanian, A.6
Young, M.W.7
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. Lecture Notes in Computer Science, 2139:19-23, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-23
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
0004181422
-
AES proposal: Rijndael
-
National Institute of Standards and Technology (NIST), Mar.
-
J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), Mar. 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs.htm.
-
(2000)
Technical Report
-
-
Daemen, J.1
Rijmen, V.2
-
6
-
-
21644488594
-
-
Digital rights management operating system. U.S. Patent 6,330,670, Dec.
-
P. England, J. DeTreville, and B. Lampson. Digital rights management operating system. U.S. Patent 6,330,670, Dec. 2001.
-
(2001)
-
-
England, P.1
Detreville, J.2
Lampson, B.3
-
7
-
-
21644481168
-
-
Loading and identifying a digital rights management operating system. U.S. Patent 6,327,652. Dec.
-
P. England, J. DeTreville, and B. Lampson. Loading and identifying a digital rights management operating system. U.S. Patent 6,327,652. Dec. 2001.
-
(2001)
-
-
England, P.1
Detreville, J.2
Lampson, B.3
-
9
-
-
84955507265
-
Caches and merkle trees for efficient memory authentication
-
Feb.
-
B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and merkle trees for efficient memory authentication. In Proceedings of the 9th International Symposium on High Performance Computer Architecture, pages 295-306, Feb. 2003.
-
(2003)
Proceedings of the 9th International Symposium on High Performance Computer Architecture
, pp. 295-306
-
-
Gassend, B.1
Suh, E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
11
-
-
0033221778
-
Hardware security for software privacy support
-
Nov.
-
T. Gilmont, J. Legat, and J. Quisquater. Hardware security for software privacy support. Electronics Letters, 35(24):2096-2097, Nov. 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.24
, pp. 2096-2097
-
-
Gilmont, T.1
Legat, J.2
Quisquater, J.3
-
14
-
-
0038650645
-
The TrustNo1 cryptoprocessor concept
-
Purdue University, Apr.
-
M. Kuhn. The TrustNo1 cryptoprocessor concept. Technical Report CS555, Purdue University, Apr. 1997.
-
(1997)
Technical Report CS555
-
-
Kuhn, M.1
-
15
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, Nov. 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
16
-
-
0037810695
-
Specifying and verifying hardware for tamper-resistant software
-
May
-
D. Lie, J. Mitchell, C. A. Thekkath, and M. Horowitz. Specifying and verifying hardware for tamper-resistant software. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pages 166-178, May 2003.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 166-178
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.A.3
Horowitz, M.4
-
17
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov.
-
D. Lie, G. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference Architectural Support for Programming Languages and Operating Systems, pages 168-177, Nov. 2000.
-
(2000)
Proceedings of the 9th International Conference Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, G.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
20
-
-
84860968802
-
-
OpenSSL, 2003. http://www.openssl.org.
-
(2003)
-
-
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(18):120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.18
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0030653560
-
Using the SimOS machine simulator to study complex computer systems
-
Jan.
-
M. Rosenblum, E. Bugnion, S. Devine, and S. A. Herrod. Using the SimOS machine simulator to study complex computer systems. Modeling and Computer Simulation, 7(1):78-103, Jan. 1997.
-
(1997)
Modeling and Computer Simulation
, vol.7
, Issue.1
, pp. 78-103
-
-
Rosenblum, M.1
Bugnion, E.2
Devine, S.3
Herrod, S.A.4
-
23
-
-
85041481084
-
Design and verification of secure systems
-
Dec.
-
J. Rushby. Design and verification of secure systems. ACM Operating Systems Review, SIGOPS, 15(5):12-21, Dec. 1981.
-
(1981)
ACM Operating Systems Review, SIGOPS
, vol.15
, Issue.5
, pp. 12-21
-
-
Rushby, J.1
-
24
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
25
-
-
84860960598
-
-
May
-
SGI IRIX 6.5: Home Page, May 2003. http://www.sgi.com/software/irix6.5.
-
(2003)
SGI IRIX 6.5: Home Page
-
-
-
27
-
-
84958045366
-
Using a high-performance, programmable secure coprocessor
-
Feb.
-
S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89, Feb. 1998.
-
(1998)
Financial Cryptography
, pp. 73-89
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
|