-
1
-
-
18844403113
-
Performance analysis of cryptographic protocols on handheld devices
-
IEEE, Los Alamitos, CA
-
ARGYROUDIS, P., VERMA, R., TEWARI, H., AND O'MAHONY, D. 2004. Performance analysis of cryptographic protocols on handheld devices. In Proceedings of the 3rd IEEE International Symposium Network Computing and Applications (NCA'04). IEEE, Los Alamitos, CA, 169-174.
-
(2004)
Proceedings of the 3rd IEEE International Symposium Network Computing and Applications (NCA'04)
, pp. 169-174
-
-
ARGYROUDIS, P.1
VERMA, R.2
TEWARI, H.3
O'MAHONY, D.4
-
4
-
-
67549130641
-
-
CHAIR FOR SYSTEM SECURITY, UNIVERSITY OF BOCHUM, GERMANY, 2005. GRUB TCG Patch to support Trusted Boot. http://trousers.sourceforge.net/grub.html.
-
CHAIR FOR SYSTEM SECURITY, UNIVERSITY OF BOCHUM, GERMANY, 2005. GRUB TCG Patch to support Trusted Boot. http://trousers.sourceforge.net/grub.html.
-
-
-
-
5
-
-
84868985684
-
-
COMPUTER EMERGENCY RESPONSE TEAM CERT
-
COMPUTER EMERGENCY RESPONSE TEAM (CERT). 2005. CERT research 2005 annual report. Carnegie Mellon University. http://www.cert.org/archive/pdf/cert-rsch-annual-rpt2005.pdf.
-
(2005)
CERT research 2005 annual report
-
-
-
6
-
-
84956860375
-
Experimenting with electronic commerce on the palmpilot
-
Springer, Berlin, Germany, NY
-
DASWANI, N. AND BONEH, D. 1999. Experimenting with electronic commerce on the palmpilot. In Proceedings of the 3rd International Conference Financial Cryptography (FC'99). Springer, Berlin, Germany, NY, 1-16.
-
(1999)
Proceedings of the 3rd International Conference Financial Cryptography (FC'99)
, pp. 1-16
-
-
DASWANI, N.1
BONEH, D.2
-
8
-
-
84868964955
-
-
notebook
-
FUJITSU. 2004. LifeBook S7000 notebook. http://www.computers.us. fujitsu.com.
-
(2004)
LifeBook
-
-
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM, New York
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. 2003. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium Operating Systems Principles (SOSP'03). ACM, New York, 193-206.
-
(2003)
Proceedings of the 19th ACM Symposium Operating Systems Principles (SOSP'03)
, pp. 193-206
-
-
GARFINKEL, T.1
PFAFF, B.2
CHOW, J.3
ROSENBLUM, M.4
BONEH, D.5
-
11
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
Springer, Berlin, Germany
-
HANKERSON, D., HERNANDEZ, J. L., AND MENEZES, A. 2000. Software implementation of elliptic curve cryptography over binary fields. In Proceedings of the 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'00). Springer, Berlin, Germany, 1-24.
-
(2000)
Proceedings of the 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'00)
, pp. 1-24
-
-
HANKERSON, D.1
HERNANDEZ, J.L.2
MENEZES, A.3
-
13
-
-
77954529315
-
-
IBM. 2004. IBM research report. https://www.trustedcomputinggroup.org/ news/articles/rc23363.pdf.
-
(2004)
IBM research report
-
-
-
14
-
-
84868969088
-
-
LENOVO. 2007. IBM thinkpad. http://www.pc.ibm.com/us/thinkpad.
-
(2007)
IBM thinkpad
-
-
LENOVO1
-
15
-
-
84868962900
-
Sharp Zaurus SL-5600
-
LINUX JOURNAL. 2004. Sharp Zaurus SL-5600. http://www.linuxjournal.com/article/6792.
-
(2004)
-
-
-
16
-
-
84947913604
-
-
m) without pre-computation. In Proceedings of the 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES '99). Springer, Berlin, Germany, 316-327.
-
m) without pre-computation. In Proceedings of the 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES '99). Springer, Berlin, Germany, 316-327.
-
-
-
-
17
-
-
4243378405
-
An overview of elliptic curve cryptography
-
State University of Campinas, Brasil
-
LÓPEZ, J. AND DAHAB, R. 2000. An overview of elliptic curve cryptography. Tech. rep. Institute of Computing, State University of Campinas, Brasil.
-
(2000)
Tech. rep. Institute of Computing
-
-
LÓPEZ, J.1
DAHAB, R.2
-
19
-
-
84868980066
-
-
ETH, Zurich, Switzerland
-
M. STRASSER. 2006. TPM Emulator. ETH, Zurich, Switzerland. http://developer.berlios.de/projects/tpm-emulator.
-
(2006)
TPM Emulator
-
-
STRASSER, M.1
-
20
-
-
84868998912
-
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DSS
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. 2006. FIPS PUB 186-3: Digital signature standard (DSS). http://csrc.nist.gov/publications/drafts/fips-186-3/Draft-FIPS-186-3%20- March2006. pdf.
-
(2006)
FIPS PUB 186-3: Digital signature standard
-
-
-
21
-
-
84868993616
-
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, General
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. 2006. NIST 800-57: Recommendation for key management - Part 1: General. http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1. pdf.
-
(2006)
NIST 800-57: Recommendation for key management
, Issue.PART 1
-
-
-
22
-
-
67549115292
-
-
OPENSSL. 2007. OpenSSL Project. http://www.openssl.org.
-
(2007)
OpenSSL Project
-
-
-
23
-
-
0033680832
-
Implementing 1,024-bit RSA exponentiation on a 32-bit processor core
-
IEEE, Los Alamitos, CA
-
PHILLIPS, B. J. AND BURGESS, N 2000. Implementing 1,024-bit RSA exponentiation on a 32-bit processor core. In Proceedings of the 11th IEEE International Conference Application-Specific Systems, Architectures, and Processors (ASAP'00). IEEE, Los Alamitos, CA, 127-137.
-
(2000)
Proceedings of the 11th IEEE International Conference Application-Specific Systems, Architectures, and Processors (ASAP'00)
, pp. 127-137
-
-
PHILLIPS, B.J.1
BURGESS, N.2
-
24
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
POTLAPALLY, N R., RAVI, S., RAGHUNATHAN, A., AND JHA, N K. 2006. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5, 128-143.
-
(2006)
IEEE Trans. Mobile Comput
, vol.5
, pp. 128-143
-
-
POTLAPALLY, N.R.1
RAVI, S.2
RAGHUNATHAN, A.3
JHA, N.K.4
-
25
-
-
85014332650
-
Security in embedded systems: Design challenges
-
RAVI, S., RAGHUNATHAN, A., KOCHER, P., AND HATTANGADY, S. 2004. Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3, 461-491.
-
(2004)
ACM Trans. Embed. Comput. Syst. 3
, pp. 461-491
-
-
RAVI, S.1
RAGHUNATHAN, A.2
KOCHER, P.3
HATTANGADY, S.4
-
26
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
ACM, New York, NY
-
SANDHU, R. AND ZHANG, X. 2005. Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the 10th ACM Symposium Access Control Models and Technologies (SACMAT '05). ACM, New York, NY, 147-158.
-
(2005)
Proceedings of the 10th ACM Symposium Access Control Models and Technologies (SACMAT '05)
, pp. 147-158
-
-
SANDHU, R.1
ZHANG, X.2
-
27
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
IEEE, Los Alamitos, CA
-
SHI, E., PERRIG, A., AND DOORN, L. V. 2005. BIND: A fine-grained attestation service for secure distributed systems. In Proceedings of the IEEE Symposium Security and Privacy (SP'05). IEEE, Los Alamitos, CA, 154-168.
-
(2005)
Proceedings of the IEEE Symposium Security and Privacy (SP'05)
, pp. 154-168
-
-
SHI, E.1
PERRIG, A.2
DOORN, L.V.3
-
29
-
-
1242286078
-
Custom-instruction synthesis for extensible-processor platforms
-
SUN, F., RAVI, S., RAGHUNATHAN, A., AND JHA, N K. 2004. Custom-instruction synthesis for extensible-processor platforms. IEEE Trans. Comput. Aid. Design Integra. Circ. Syst. 23, 216-228.
-
(2004)
IEEE Trans. Comput. Aid. Design Integra. Circ. Syst. 23
, pp. 216-228
-
-
SUN, F.1
RAVI, S.2
RAGHUNATHAN, A.3
JHA, N.K.4
-
30
-
-
67549088246
-
-
SUN MICROSYSTEMS. 2005. Sun's elliptic curve technology contribution to the OpenSSL. http://research.sun.com/projects/crypto/ FrequenlyAskedQuestions.html.
-
SUN MICROSYSTEMS. 2005. Sun's elliptic curve technology contribution to the OpenSSL. http://research.sun.com/projects/crypto/ FrequenlyAskedQuestions.html.
-
-
-
-
32
-
-
35048840661
-
-
m). In Proceedings of the 9th International Conference Asia-Pacific Computer Systems Architecture. 282-295.
-
m). In Proceedings of the 9th International Conference Asia-Pacific Computer Systems Architecture. 282-295.
-
-
-
-
33
-
-
34548346180
-
-
TRUSTED COMPUTING GROUP
-
TRUSTED COMPUTING GROUP. 2004. TCG Glossary. https://www.trustedcomputinggroup.org/groups/TCGGlossary.pdf.
-
(2004)
TCG Glossary
-
-
-
34
-
-
21644486314
-
-
TRUSTED COMPUTING GROUP
-
TRUSTED COMPUTING GROUP. 2004. TCG specification architecture overview. https://www.trustedcomputinggroup.org/ specs/TPM.
-
(2004)
TCG specification architecture overview
-
-
-
35
-
-
84868989075
-
-
TRUSTED MOBILE PLATFORM. 2004. http://www.trusted-mobile.org.
-
(2004)
-
-
-
36
-
-
35048823217
-
-
m) arithmetic in software and its application to ECC. In Proceedings of the 8th Australasian Conference Information Security and Privacy (ACISP'03). Springer, Berlin, Germany, NY, 79-92.
-
m) arithmetic in software and its application to ECC. In Proceedings of the 8th Australasian Conference Information Security and Privacy (ACISP'03). Springer, Berlin, Germany, NY, 79-92.
-
-
-
-
37
-
-
17644368369
-
Cryptography in embedded systems: An overview
-
ACM, New York, NY
-
WOLLINGER, T., JARDO, J. G., AND PAAR, C. 2003. Cryptography in embedded systems: An overview. In Proceedings of the Embedded World Conference. ACM, New York, NY, 735-744.
-
(2003)
Proceedings of the Embedded World Conference
, pp. 735-744
-
-
WOLLINGER, T.1
JARDO, J.G.2
PAAR, C.3
-
38
-
-
38949139795
-
Satem: Trusted service code execution across transactions
-
IEEE, Los Alamitos, CA
-
XU, G., BORCEA, C., AND IFTODE, L. 2006. Satem: Trusted service code execution across transactions. In Proceedings of the IEEE International Symposium Reliable Distributed Systems (SRDS'06). IEEE, Los Alamitos, CA, 337-338.
-
(2006)
Proceedings of the IEEE International Symposium Reliable Distributed Systems (SRDS'06)
, pp. 337-338
-
-
XU, G.1
BORCEA, C.2
IFTODE, L.3
|