-
2
-
-
71549129417
-
Halting password puzzles: Hard-to-break encryption from human-memorable keys
-
August
-
Boyen, X. Halting password puzzles: Hard-to-break encryption from human-memorable keys. In Proceedings of the 16th USENIX Security Symposium (August 2008).
-
(2008)
Proceedings of the 16th USENIX Security Symposium
-
-
Boyen, X.1
-
3
-
-
84948973494
-
Exposureresilient functions and all-or-nothing transforms
-
Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A. Exposureresilient functions and all-or-nothing transforms. In EUROCRYPT 2000, volume 1807/2000 (2000), 453-469.
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
4
-
-
66149170813
-
Bootjacker: Compromising computers using forced restarts
-
October
-
Chan, E.M., Carlyle, J.C., David, F.M., Farivar, R., Campbell, R.H. Bootjacker: Compromising computers using forced restarts. In Proceedings of the 15th ACM Conference on Computer and Communications Security (October 2008), 555-564.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Chan, E.M.1
Carlyle, J.C.2
David, F.M.3
Farivar, R.4
Campbell, R.H.5
-
5
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
August
-
Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M. Shredding your garbage: Reducing data lifetime through secure deallocation. In Proceedings of the 14th USENIX Security Symposium (August 2005), 331-346.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
7
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
Oct.
-
D yer, J.G., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.W., Weingart, S. Building the IBM 4758 secure coprocessor. Computer 34 (Oct. 2001), 57-66.
-
(2001)
Computer
, vol.34
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
12
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
L ie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M. Architectural support for copy and tamper resistant software. In Symposium on Architectural Support for Programming Languages and Operating Systems (2000).
-
(2000)
Symposium on Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
13
-
-
0018482902
-
Eigenschaften von MOS-ein-transistorspeicherzellen bei tiefen temperaturen
-
June
-
Link, W., May, H. Eigenschaften von MOS-Ein-Transistorspeicherzellen bei tiefen Temperaturen. Archiv fur Elektronik und aebertragungstechnik 33 (June 1979), 229-235.
-
(1979)
Archiv Fur Elektronik und Aebertragungstechnik
, vol.33
-
-
Link, W.1
May, H.2
-
16
-
-
84956866637
-
Playing "hide and seek" with stored keys
-
S hamir, A., van Someren, N. Playing "hide and seek" with stored keys. LNCS 1648 (1999), 118-124.
-
(1999)
LNCS
, vol.1648
-
-
Shamir, A.1
Van Someren, N.2
|