-
2
-
-
70350696050
-
-
Helmuth, C., Warg, A., Feske, N.: Mikro-SINA - Hands-on Experiences with the Nizza Security Architecture. In: Proceedings of the D.A.CH Security (March 2005)
-
Helmuth, C., Warg, A., Feske, N.: Mikro-SINA - Hands-on Experiences with the Nizza Security Architecture. In: Proceedings of the D.A.CH Security (March 2005)
-
-
-
-
5
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
6
-
-
70350699446
-
Cache missing for fun and profit
-
Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan 2005 (2005)
-
(2005)
Proceedings of BSDCan
-
-
Percival, C.1
-
7
-
-
70350689771
-
-
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Research Report RC23511, IBM Research (February 2005)
-
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Research Report RC23511, IBM Research (February 2005)
-
-
-
-
8
-
-
21644455412
-
Terra: A VirtualMachine-Based Platform for Trusted Computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum,M., Boneh, D.: Terra: A VirtualMachine-Based Platform for Trusted Computing. In: Proceedings of the 9th ACM Synopsium on Operating System Principles, pp. 193-206 (2003)
-
(2003)
Proceedings of the 9th ACM Synopsium on Operating System Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
9
-
-
0036147270
-
-
Shapiro, J., Hardy, N.: EROS: A Principle-Driven Operating System from the Ground Up. IEEE Software, 26-33 (January 2002)
-
Shapiro, J., Hardy, N.: EROS: A Principle-Driven Operating System from the Ground Up. IEEE Software, 26-33 (January 2002)
-
-
-
-
10
-
-
33947691568
-
The Nizza Secure-System Architecture
-
IEEE Press, Los Alamitos
-
Härtig, H., Hohmuth, M., Feske, N., Helmuth, C., Lackorzynski, A., Mehnert, F., Peter, M.: The Nizza Secure-System Architecture. In: Proceedings of IEEE CollaborateCom 2005, p. 10. IEEE Press, Los Alamitos (2005)
-
(2005)
Proceedings of IEEE CollaborateCom
, pp. 10
-
-
Härtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
11
-
-
77952256837
-
Towards Trustworthy Computing Systems: TakingMicrokernels to the Next Level
-
Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.M.: Towards Trustworthy Computing Systems: TakingMicrokernels to the Next Level. ACMOperating Systems Review 41(4), 3-11 (2007)
-
(2007)
ACMOperating Systems Review
, vol.41
, Issue.4
, pp. 3-11
-
-
Heiser, G.1
Elphinstone, K.2
Kuz, I.3
Klein, G.4
Petters, S.M.5
-
12
-
-
84869637281
-
-
Diplomarbeit, Technische Universität Dresden November 2004
-
Syckor, J.: IPSec Infrastruktur für Mikro-SINA, Diplomarbeit, Technische Universität Dresden (November 2004), os.inf.tu-dresden.de/ papers-ps/syckor-diplom.pdf
-
IPSec Infrastruktur für Mikro-SINA
-
-
Syckor, J.1
-
13
-
-
70350669732
-
-
McDonald, D, Metz, C, Phan, B, PF-KEY Key Management API, Version 2. RFC 2367, Internet Engineering Task Force July 1998
-
McDonald, D., Metz, C., Phan, B.: PF-KEY Key Management API, Version 2. RFC 2367, Internet Engineering Task Force (July 1998)
-
-
-
-
16
-
-
0004006818
-
-
RFC 4302, Internet Engineering Task Force December
-
Kent, S.: IP Authentication Header. RFC 4302, Internet Engineering Task Force (December 2005)
-
(2005)
IP Authentication Header
-
-
Kent, S.1
-
17
-
-
0003406377
-
-
2nd edn. Prentice Hall PTR, Englewood Cliffs
-
Doraswamy, N., Harkins, D.: IPsec: The new Security Standard for the Internet, Intranets and Virtual Private Networks, 2nd edn. Prentice Hall PTR, Englewood Cliffs (2003)
-
(2003)
IPsec: The new Security Standard for the Internet, Intranets and Virtual Private Networks
-
-
Doraswamy, N.1
Harkins, D.2
-
19
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
ACM, New York
-
Aiello, W., Bellovin, S.M., Blaze, M., Ioannidis, J., Reingold, O., Canetti, R., Keromytis, A.D.: Efficient, DoS-resistant, secure key exchange for internet protocols. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 48-58. ACM, New York (2002)
-
(2002)
CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.D.7
-
21
-
-
85084160050
-
-
Bellovin, S.: Problem Areas for the IP Security Protocols. In: Proceedings of the Sixth Usenix Security Symposium (July 1996)
-
Bellovin, S.: Problem Areas for the IP Security Protocols. In: Proceedings of the Sixth Usenix Security Symposium (July 1996)
-
-
-
-
22
-
-
70350653825
-
-
Degabriele, J.P., Paterson, K.G.: Attacking the IPsec Standards in Encryption-only Configurations (2007), eprint.iacr.org/2007/125
-
Degabriele, J.P., Paterson, K.G.: Attacking the IPsec Standards in Encryption-only Configurations (2007), eprint.iacr.org/2007/125
-
-
-
-
23
-
-
50249183539
-
Traffic masking in IPsec: Architecture and implementation
-
Kiraly, C., Bianchi, G., Formisano, F., Teofili, S., Lo Cigno, R.: Traffic masking in IPsec: architecture and implementation. In: Mobile and Wireless Communications Summit, 16th IST, pp. 1-5 (2007)
-
(2007)
Mobile and Wireless Communications Summit, 16th IST
, pp. 1-5
-
-
Kiraly, C.1
Bianchi, G.2
Formisano, F.3
Teofili, S.4
Lo Cigno, R.5
-
24
-
-
0005974305
-
IKE/ISAKMP Considered Harmful
-
December
-
Simpson, W.A.: IKE/ISAKMP Considered Harmful. Usenix, login 24(6) (December 1999)
-
(1999)
Usenix, login
, vol.24
, Issue.6
-
-
Simpson, W.A.1
-
26
-
-
18744416850
-
DoS protection for UDP-based protocols
-
ACM, New York
-
Kaufman, C., Perlman, R., Sommerfeld, B.: DoS protection for UDP-based protocols. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 2-7. ACM, New York (2003)
-
(2003)
CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 2-7
-
-
Kaufman, C.1
Perlman, R.2
Sommerfeld, B.3
-
27
-
-
33644781732
-
Uncovering identities: A study into VPN tunnel fingerprinting
-
Izadinia, V.D., Kourie, D., Eloff, J.: Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security 25(2), 97-105 (2006)
-
(2006)
Computers & Security
, vol.25
, Issue.2
, pp. 97-105
-
-
Izadinia, V.D.1
Kourie, D.2
Eloff, J.3
-
28
-
-
70350643690
-
Tcg storage architecture core specification
-
Storage Work Group, Technical report, Trusted Computing Group May
-
Storage Work Group. Tcg storage architecture core specification. Technical report, Trusted Computing Group (May 2007)
-
(2007)
-
-
-
29
-
-
9744271083
-
-
RFC 3931, Internet Engineering Task Force
-
Lau, J., Townsley, M., Goyret, I.: Layer Two Tunneling Protocol - Version 3 (L2TPv3). RFC 3931, Internet Engineering Task Force (2005)
-
(2005)
Layer Two Tunneling Protocol - Version 3 (L2TPv3)
-
-
Lau, J.1
Townsley, M.2
Goyret, I.3
-
30
-
-
84869637327
-
-
Alkassar, A., Stüble, C.: Die Sicherheitsplattform Turaya. In: Trusted Computing, pp. 86-96. Vieweg+Teubner (May 2008)
-
Alkassar, A., Stüble, C.: Die Sicherheitsplattform Turaya. In: Trusted Computing, pp. 86-96. Vieweg+Teubner (May 2008)
-
-
-
-
33
-
-
3142669383
-
-
RFC 3948, Internet Engineering Task Force
-
Huttunen, A., Swander, B., Volpe, V., DiBurro, L., Stenberg,M.: UDP Encapsulation of IPsec ESP Packets. RFC 3948, Internet Engineering Task Force (2005)
-
(2005)
UDP Encapsulation of IPsec ESP Packets
-
-
Huttunen, A.1
Swander, B.2
Volpe, V.3
DiBurro, L.4
Stenberg, M.5
-
34
-
-
1642279092
-
-
RFC 2393, Internet Engineering Task Force December
-
Shacham, A., Monsour, R., Pereira, R., Thomas, M.: IP Payload Compression Protocol (IPComp). RFC 2393, Internet Engineering Task Force (December 1998)
-
(1998)
IP Payload Compression Protocol (IPComp)
-
-
Shacham, A.1
Monsour, R.2
Pereira, R.3
Thomas, M.4
|