-
2
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE Computer Society, Los Alamitos
-
Arbaugh, W.A., Farbert, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65-71. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farbert, D.J.2
Smith, J.M.3
-
3
-
-
44049086023
-
AES-CBC + Elephant diffuser: A disk encryption algorithm for windows vista
-
Tech. rep, Microsoft
-
Fergusson, N.: AES-CBC + Elephant diffuser: A disk encryption algorithm for windows vista. Tech. rep., Microsoft (2006)
-
(2006)
-
-
Fergusson, N.1
-
5
-
-
70350652038
-
NVbit: Accessing bitlocker volumes from linux
-
NVlabs: NVbit: Accessing bitlocker volumes from linux. Web page (2008), http://www.nvlabs.in/node/9
-
(2008)
Web page
-
-
-
7
-
-
62749155627
-
Lest we remember: Cold boot attacks on encryption keys
-
Tech. rep, Princeton University
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. Tech. rep., Princeton University (2008)
-
(2008)
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
10
-
-
43649103310
-
Security assessment of trusted platform modules
-
Tech. rep, Dartmouth College
-
Sparks, E.R.: Security assessment of trusted platform modules. Tech. rep., Dartmouth College (2007)
-
(2007)
-
-
Sparks, E.R.1
-
13
-
-
68549104046
-
-
Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç .K. (eds.) CHES 2000. LNCS, 1965, pp. 302-317. Springer, Heidelberg (2000)
-
Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç .K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302-317. Springer, Heidelberg (2000)
-
-
-
-
15
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Drimer, S., Murdoch, S.J.: Keep your enemies close: Distance bounding against smartcard relay attacks. In: USENIX Security 2007 (2007)
-
(2007)
USENIX Security
-
-
Drimer, S.1
Murdoch, S.J.2
-
18
-
-
49049115189
-
-
Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369-1376 (2008), doi:10.1109/ARES.2008.109
-
Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369-1376 (2008), doi:10.1109/ARES.2008.109
-
-
-
|