-
1
-
-
35248817849
-
The EM side-channel(s)
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer Verlag, pages Redwood Shores, CA, 13-15 August
-
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science, Vol.2523, Springer Verlag, pages 29-45, Redwood Shores, CA, 13-15 August 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2523
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
0003400251
-
-
ESD-TR-75-306, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, June
-
D. E. Bell and L. J. LaPadula. Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, June 1975.
-
(1975)
Computer Security Model: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
5
-
-
0003400255
-
-
ESD-TR-76-372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, Apr.
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. ESD-TR-76-372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, Apr. 1977.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
6
-
-
77952262202
-
Concept for trusted personal devices in a mobile and networked environment
-
F. C. Bormann, L. Manteau, A. Linke, J. C. Pailles, and J. van Dijk. Concept for trusted personal devices in a mobile and networked environment. In Fifteenth IST Mobile & Wireless Communication Summit, Myconos, Greece, June 2006.
-
Fifteenth IST Mobile & Wireless Communication Summit, Myconos, Greece, June 2006
-
-
Bormann, F.C.1
Manteau, L.2
Linke, A.3
Pailles, J.C.4
Van Dijk, J.5
-
7
-
-
79551634584
-
-
Homeland Security Presidential Directive HSPD-12, The White House, Washington, DC, 27 August
-
G. W. Bush. Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12, The White House, Washington, DC, 27 August 2004. URL: http://csrc.nist.gov/ policies/Presidential-Directive-Hspd-12.html.
-
(2004)
Policy for a Common Identification Standard for Federal Employees and Contractors
-
-
Bush, G.W.1
-
8
-
-
84869635960
-
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
-
Advances in Cryptology - Crypto 2002, pages 143-161, Santa Barbara, CA, Springer Verlag
-
R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology - Crypto 2002, pages 143-161, Santa Barbara, CA, 2002. Lecture Notes in Computer Science, Vol.2045, Springer Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2045
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
77952260827
-
-
Order No. EY-AX00080-SM-001, Digital Equipment Corporation, Maynard, MA
-
M. G. Carter, S. B. Lipner, and P. A. Karger. Protecting data & information: A workshop in computer & data security. Order No. EY-AX00080-SM-001, Digital Equipment Corporation, Maynard, MA, 1982.
-
(1982)
Protecting Data & Information: A Workshop in Computer & Data Security
-
-
Carter, M.G.1
Lipner, S.B.2
Karger, P.A.3
-
10
-
-
77952273935
-
Method, apparatus and system for resistence to side channel attacks on random number generators
-
United States Patent Application No. US 2006/0104443A1, Filed 12 November
-
S. N. Chari, V. V. Diluoffo, P. A. Karger, E. R. Palmer, T. Rabin, J. R. Rao, P. Rohatgi, H. Scherzer, M. Steiner, and D. C. Toll. Method, apparatus and system for resistence to side channel attacks on random number generators. United States Patent Application No. US 2006/0104443A1, Filed 12 November 2004.
-
(2004)
-
-
Chari, S.N.1
Diluoffo, V.V.2
Karger, P.A.3
Palmer, E.R.4
Rabin, T.5
Rao, J.R.6
Rohatgi, P.7
Scherzer, H.8
Steiner, M.9
Toll, D.C.10
-
11
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control: Extended abstract
-
Oakland, CA, 20-23 May IEEE Computer Society
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control: Extended abstract. In Proceedings of the IEEE Sympsium on Security and Privacy, pages 222-227, Oakland, CA, 20-23 May 2007. IEEE Computer Society.
-
(2007)
Proceedings of the IEEE Sympsium on Security and Privacy
, pp. 222-227
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
12
-
-
0003765587
-
-
Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-1003, August
-
Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3. Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-1003, August 2005. URL: http://www.commoncriteriaportal.org/public/expert/index.php? menu=2.
-
(2005)
Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3
-
-
-
14
-
-
60749089448
-
The structure of the THE multiprogramming system
-
May
-
E. W. Dijkstra. The structure of the THE multiprogramming system. Communications of the ACM, 11(5):341-346, May 1968.
-
(1968)
Communications of the ACM
, vol.11
, Issue.5
, pp. 341-346
-
-
Dijkstra, E.W.1
-
15
-
-
21644455797
-
-
AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 Sept.
-
Functionality classes and evaluation methodology for physical random number generators. AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 Sept. 2001. URL: http://www.bsi.bund.de/zertifiz/zert/interpr/ais31e.pdf.
-
(2001)
Functionality Classes and Evaluation Methodology for Physical Random Number Generators
-
-
-
17
-
-
0003765598
-
-
Version 1.2, Commission of the European Communities, Brussels, Belgium, June
-
Information technology security evaluation criteria (ITSEC). Version 1.2, Commission of the European Communities, Brussels, Belgium, June 1991. URL: http://www.ssi.gouv.fr/site documents/ITSEC/ITSEC-uk.pdf.
-
(1991)
Information Technology Security Evaluation Criteria (ITSEC)
-
-
-
20
-
-
77952286492
-
-
RC 21673 (97655), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February
-
P. A. Karger. Multi-Organizational Mandatory Access Controls for Commercial Applications. RC 21673 (97655), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February 2000. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home.
-
(2000)
Multi-Organizational Mandatory Access Controls for Commercial Applications
-
-
Karger, P.A.1
-
21
-
-
0011272226
-
-
RC 21717 (97406), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March
-
P. A. Karger, V. R. Austel, and D. C. Toll. A New Mandatory Security Policy Combining Secrecy and Integrity. RC 21717 (97406), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL: http://domino.watson. ibm.com/library/CyberDig.nsf/home.
-
(2000)
A New Mandatory Security Policy Combining Secrecy and Integrity
-
-
Karger, P.A.1
Austel, V.R.2
Toll, D.C.3
-
22
-
-
0000474763
-
Differential Power Analysis: Leaking Secrets
-
Proceedings of Crypto '99, Springer Verlag, Santa Barbara, CA, August
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking Secrets. In Proceedings of Crypto '99, Lecture Notes in Computer Science, Vol.1666, Springer Verlag, pages 143-161, Santa Barbara, CA, August 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 143-161
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
23
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffe-Hellman and its Use in the IKE Protocols
-
Advances in Cryptology - CRYPTO 2003 Proceesings Santa Barbara, CA, 17-21 August Springer Verlag
-
H. Krawczyk. SIGMA: the 'SIGn-and-MAc' Approach to Authenticated Diffe-Hellman and its Use in the IKE Protocols. In Advances in Cryptology - CRYPTO 2003 Proceesings, pages 399-424, Santa Barbara, CA, 17-21 August 2003. Lecture Notes in Computer Science, Vol.2729, Springer Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 399-424
-
-
Krawczyk, H.1
-
25
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
6th European Symposium on Research in Computer Security (ESORICS 2000), Springer Verlag, Toulouse, France
-
G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll. Verification of a formal security model for multiapplicative smart cards. In 6th European Symposium on Research in Computer Security (ESORICS 2000), Lecture Notes in Computer Science, Vol.1895, Springer Verlag, pages 17-36, Toulouse, France, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
26
-
-
0142157011
-
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
-
8th European Symposium on Research in Computer Security (ESORICS 2003), Gjøvik, Norway, 13-15 October Springer Verlag
-
H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Rabin, and D. C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. In 8th European Symposium on Research in Computer Security (ESORICS 2003), pages 181-200, Gjøvik, Norway, 13-15 October 2003. Lecture Notes in Computer Science, Vol.2808, Springer Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2808
, pp. 181-200
-
-
Scherzer, H.1
Canetti, R.2
Karger, P.A.3
Krawczyk, H.4
Rabin, T.5
Toll, D.C.6
-
27
-
-
77952276178
-
-
ESD-TR-75-169, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, May
-
W. L. Schiller. The design and specification of a security kernel for the PDP-11/45. ESD-TR-75-169, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, May 1975. URL: http://csrc.nist.gov/ publications/history/schi75.pdf.
-
(1975)
The Design and Specification of a Security Kernel for the PDP-11/45
-
-
Schiller, W.L.1
-
28
-
-
77952249782
-
-
ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Dec.
-
J. Whitmore, A. Bensoussan, P. Green, D. Hunt, A. Kobziar, and J. Stern. Design for Multics security enhancements. ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Dec. 1973. URL: http://csrc.nist.gov/publications/history/whit74.pdf.
-
(1973)
Design for Multics Security Enhancements
-
-
Whitmore, J.1
Bensoussan, A.2
Green, P.3
Hunt, D.4
Kobziar, A.5
Stern, J.6
-
29
-
-
85011101226
-
Challenges and experience in prototyping a multi-modal stream analytic and monitoring application on System S
-
Vienna, Austria, 23-27 September
-
K.-L. Wu, P. S. Yu, B. Gedik, K. Hildrum, C. C. Aggarwal, E. Bouillet, W. Fan, D. George, X. Gu, G. Luo, and H. Wang. Challenges and experience in prototyping a multi-modal stream analytic and monitoring application on System S. In Proceedings of the 33rd International Conference on Very Large Data Bases, pages 1185-1196, Vienna, Austria, 23-27 September 2007. URL: http://www.vldb.org/conf/2007/papers/industrial/p1185-wu.pdf.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 1185-1196
-
-
Wu, K.-L.1
Yu, P.S.2
Gedik, B.3
Hildrum, K.4
Aggarwal, C.C.5
Bouillet, E.6
Fan, W.7
George, D.8
Gu, X.9
Luo, G.10
Wang, H.11
|