-
1
-
-
70350431459
-
-
Southern california edison achieves key advanced metering goal. Electric Energy Online (August 2, 2007), http://electricenergyonline.com/IndustryNews. asp?m=1\&id=71649
-
Southern california edison achieves key advanced metering goal. Electric Energy Online (August 2, 2007), http://electricenergyonline.com/IndustryNews. asp?m=1\&id=71649
-
-
-
-
2
-
-
70350409829
-
-
TCG specification architecture overview. Trusted Computing Group (August 2, 2007), http://www.trustedcomputinggroup.org/developers/trusted platform module/specifications
-
TCG specification architecture overview. Trusted Computing Group (August 2, 2007), http://www.trustedcomputinggroup.org/developers/trusted platform module/specifications
-
-
-
-
3
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
-
Anderson, R.J., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125-136. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.2
-
6
-
-
0036957203
-
Model checking fault tolerant systems
-
Bernardeschi, C., Fantechi, A., Gnesi, S.: Model checking fault tolerant systems. Software Testing, Verification & Reliability 12(4), 251-275 (2002)
-
(2002)
Software Testing, Verification & Reliability
, vol.12
, Issue.4
, pp. 251-275
-
-
Bernardeschi, C.1
Fantechi, A.2
Gnesi, S.3
-
7
-
-
59249102694
-
Attested append-only memory: Making adversaries stick to their word
-
ACM Press, New York
-
Chun, B., Maniatis, P., Shenker, S., Kubiatowicz, J.: Attested append-only memory: making adversaries stick to their word. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp. 189-204. ACM Press, New York (2007)
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 189-204
-
-
Chun, B.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
8
-
-
33745466917
-
-
Version 2.1, SRI International, Menlo Park April
-
Clavel, M., Duran, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: Maude Manual (Version 2.1). SRI International, Menlo Park (April 2005)
-
(2005)
Maude Manual
-
-
Clavel, M.1
Duran, F.2
Eker, S.3
Lincoln, P.4
Marti-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
9
-
-
50249142448
-
Cloaker: Hardware Supported Rootkit Concealment
-
David, F., Chan, E., Carlyle, J., Campbell, R.: Cloaker: Hardware Supported Rootkit Concealment. In: Proceeedings of the 29th IEEE Symposium on Security and Privacy, pp. 296-310 (2008)
-
(2008)
Proceeedings of the 29th IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
David, F.1
Chan, E.2
Carlyle, J.3
Campbell, R.4
-
10
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P.: ReVirt: enabling intrusion analysis through virtual-machine logging and replay. ACM SIGOPS Operating Systems Review 36, 211-224 (2002)
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, pp. 211-224
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
11
-
-
19044397906
-
The Maude LTL Model Checker
-
Eker, S., Meseguer, J., Sridharanarayanan, A.: The Maude LTL Model Checker. Electronic Notes in Theoretical Computer Science 71, 162-187 (2004)
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.71
, pp. 162-187
-
-
Eker, S.1
Meseguer, J.2
Sridharanarayanan, A.3
-
12
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. LNCS, pp. 251-261 (2001)
-
(2001)
LNCS
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
13
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press, New York
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 193-206. ACM Press, New York (2003)
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
33747255010
-
Applying protocol analysis to security device interfaces
-
Herzog, J.: Applying protocol analysis to security device interfaces. IEEE Security and Privacy 4(4), 84-87 (2006)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.4
, pp. 84-87
-
-
Herzog, J.1
-
15
-
-
61649110928
-
DejaView: A personal virtual computer recorder
-
ACM Press, New York
-
Laadan, O., Baratto, R., Phung, D., Potter, S., Nieh, J.: DejaView: a personal virtual computer recorder. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp. 279-292. ACM Press, New York (2007)
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 279-292
-
-
Laadan, O.1
Baratto, R.2
Phung, D.3
Potter, S.4
Nieh, J.5
-
16
-
-
39749178297
-
Unified architecture for large-scale attested metering
-
Hawaii, January, IEEE, Los Alamitos
-
LeMay, M., Gross, G., Gunter, C.A., Garg, S.: Unified architecture for large-scale attested metering. In: Proceedings of the 40th Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2007. IEEE, Los Alamitos (2007)
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences, Big Island
-
-
LeMay, M.1
Gross, G.2
Gunter, C.A.3
Garg, S.4
-
17
-
-
85076877909
-
TrInc: Small trusted hardware for large distributed systems
-
Levin, D., Douceur, J.R., Lorch, J.R., Moscibroda, T.: TrInc: Small trusted hardware for large distributed systems. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (2009)
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
-
-
Levin, D.1
Douceur, J.R.2
Lorch, J.R.3
Moscibroda, T.4
-
20
-
-
85084162270
-
-
Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 233-238. USENIX Association (2004)
-
Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 233-238. USENIX Association (2004)
-
-
-
-
21
-
-
51649107345
-
On the deployment of Mobile Trusted Modules
-
Schmidt, A., Kuntze, N., Kasper, M.: On the deployment of Mobile Trusted Modules. In: Proceedings of the 9th IEEE Conference on Wireless Communications and Networking, pp. 3169-3174
-
Proceedings of the 9th IEEE Conference on Wireless Communications and Networking
, pp. 3169-3174
-
-
Schmidt, A.1
Kuntze, N.2
Kasper, M.3
-
22
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: Proceedings of the 25th IEEE Symposium on Security and Privacy, pp. 272-282 (2004)
-
(2004)
Proceedings of the 25th IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.4
-
23
-
-
70350375841
-
Pripayd: Privacy friendly pay-as-you-drive insurance
-
ACM Press, New York
-
Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: Pripayd: privacy friendly pay-as-you-drive insurance. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 99-107. ACM Press, New York (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society
, pp. 99-107
-
-
Troncoso, C.1
Danezis, G.2
Kosta, E.3
Preneel, B.4
-
24
-
-
70349253246
-
Trusted Computing building blocks for embedded Linux-based ARM TrustZone platforms
-
ACM Press, New York
-
Winter, J.: Trusted Computing building blocks for embedded Linux-based ARM TrustZone platforms. In: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing. ACM Press, New York (2008)
-
(2008)
Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing
-
-
Winter, J.1
|