-
1
-
-
17644398259
-
Secure object identification-or: Solving the Chess Grandmaster Problem
-
ACM Press, New York
-
Alkassar, A., Stüble, C., Sadeghi, A.-R.: Secure object identification-or: solving the Chess Grandmaster Problem. In: NSPW 2003. Proceedings of the 2003 workshop on New security paradigms, pp. 77-85. ACM Press, New York (2003)
-
(2003)
NSPW 2003. Proceedings of the 2003 workshop on New security paradigms
, pp. 77-85
-
-
Alkassar, A.1
Stüble, C.2
Sadeghi, A.-R.3
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
ACM Press, New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164-177. ACM Press, New York (2003), http://www.cl.cam.ac.uk/ netos/papers/2003-xensosp.pdf
-
(2003)
SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
85030309636
-
Identification Tokens-or: Solving the Chess Grandmaster Problem
-
Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Beth, T., Desmedt, Y.: Identification Tokens-or: Solving the Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 11-15. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 11-15
-
-
Beth, T.1
Desmedt, Y.2
-
5
-
-
84976295016
-
Distance Bounding Protocols
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 302-9743. Springer, Heidelberg (1994), http://link.springer-ny.com/link/service/series/0558/papers/0765/ 07650344.pdf
-
(1994)
LNCS
, vol.765
, pp. 302-9743
-
-
Brands, S.1
Chaum, D.2
-
7
-
-
24744432328
-
Securing The X Window System With SELinux
-
Tech. Rep. 03-006, NAI Labs March
-
Kilpatrick, D., Salamon, W., Vance, C.: Securing The X Window System With SELinux. Tech. Rep. 03-006, NAI Labs (March 2003), http://www.nsa.gov/selinux/ papers/X11_Study.pdf
-
(2003)
-
-
Kilpatrick, D.1
Salamon, W.2
Vance, C.3
-
8
-
-
2442425355
-
Integrating Flexible Support for Security Policies into the Linux Operating System
-
USENIX Association
-
Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: The 2001 USENIX Annual Technical Conference, USENIX Association (2001)
-
(2001)
The 2001 USENIX Annual Technical Conference
-
-
Loscocco, P.1
Smalley, S.2
-
9
-
-
0028763491
-
Teleporting in an X Window System Environment
-
Richardson, T., Bennett, F., Hopper, A.: Teleporting in an X Window System Environment. IEEE Personal Communications Magazine 1(3), 6-12 (1994), http://www.uk.research.att.com/pub/docs/att/tr.94.4.ps.Z
-
(1994)
IEEE Personal Communications Magazine
, vol.1
, Issue.3
, pp. 6-12
-
-
Richardson, T.1
Bennett, F.2
Hopper, A.3
-
10
-
-
0007968045
-
Virtual Network Computing
-
Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33-38 (1998), http://www.uk.research.att.com/pub/docs/att/tr.98.1.pdf
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
11
-
-
38149018234
-
Secure Verification of Location Claims
-
Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. CryptoBytes 7(1), 17-29 (2004)
-
(2004)
CryptoBytes
, vol.7
, Issue.1
, pp. 17-29
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
12
-
-
0013413164
-
-
John Wiley and Sons, Chichester
-
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002), http://www-lce.eng.cam.ac.uk/fms27/secubicomp/
-
(2002)
Security for Ubiquitous Computing
-
-
Stajano, F.1
-
13
-
-
38149015864
-
-
Stajano, F.: One user, many hats; and, sometimes, no hat-towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols, http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf (to appear, 2004)
-
Stajano, F.: One user, many hats; and, sometimes, no hat-towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols, http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf (to appear, 2004)
-
-
-
|