-
1
-
-
0031071026
-
The network computer and its future
-
San Francisco, CA, USA
-
R. W. Brodersen, "The network computer and its future," in IEEE International Solid-State Circuits Conference, San Francisco, CA, USA, 1997, pp. 32-36.
-
(1997)
IEEE International Solid-State Circuits Conference
, pp. 32-36
-
-
Brodersen, R.W.1
-
2
-
-
77949739762
-
-
Available
-
Netbook. Available: http://en.wikipedia.org/wiki/Netbook
-
Netbook
-
-
-
3
-
-
77949767525
-
-
Available
-
Nettop. Available: http://en.wikipedia.org/wiki/Nettop
-
Nettop
-
-
-
4
-
-
77949669849
-
-
June 15, Available
-
M. Zalewski. (2009, June 15). Browser security handbook. Available: http://code.google.com/p/browsersec/wiki/Main
-
(2009)
Browser security handbook
-
-
Zalewski, M.1
-
5
-
-
77949728320
-
-
December 18, Available
-
E. Ogg. (2008, December 18). The rise of the netbook. Available: http://news.cnet.com/Year-in-review-The-rise-of-the-Netbook/2009-1042-3-6248307. html
-
(2008)
The rise of the netbook
-
-
Ogg, E.1
-
6
-
-
85084095841
-
Designing and implementing malicious hardware
-
San Francisco, California
-
S. T. King, et al., "Designing and implementing malicious hardware," in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, 2008, pp. 1-8.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-8
-
-
King, S.T.1
-
8
-
-
77949674591
-
Towards countering the rise of the silicon trojan
-
December
-
M. Anderson, C. North, and K. Yiu, "Towards countering the rise of the silicon trojan," Defence Science and Technology Organisation, Melbourne, Victoria DSTO-TR-2220, December 2008.
-
(2008)
Defence Science and Technology Organisation, Melbourne, Victoria DSTO-TR-2220
-
-
Anderson, M.1
North, C.2
Yiu, K.3
-
9
-
-
77949742751
-
-
T. C. Group. (2006, 29 March). Tpm main specification 1.2 part 1 - design principles Available: http://www.trustedcomputinggroup.org/resources/tpm-main- specification-12-revision-94-part-1--design-principles
-
T. C. Group. (2006, 29 March). Tpm main specification 1.2 part 1 - design principles Available: http://www.trustedcomputinggroup.org/resources/tpm-main- specification-12-revision-94-part-1--design-principles
-
-
-
-
10
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters, "Securing a remote terminal application with a mobile trusted device," in Computer Security Applications Conference, 2004. 20th Annual, 2004, pp. 438-447.
-
(2004)
Computer Security Applications Conference, 2004. 20th Annual
, pp. 438-447
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
11
-
-
33745906238
-
-
R. Sharp, J. Scott, and A. Beresford, Secure mobile computing via public terminals, ed, 2006, pp. 238-253.
-
R. Sharp, J. Scott, and A. Beresford, "Secure mobile computing via public terminals," ed, 2006, pp. 238-253.
-
-
-
-
12
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Bump in the ether: A framework for securing sensitive user input," in Proceedings of the 2006 USENIX Annual Technical Conference, 2006, pp. 185-198.
-
(2006)
Proceedings of the 2006 USENIX Annual Technical Conference
, pp. 185-198
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
13
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
Boston, MA
-
J. M. McCune, A. Perrig, A. Seshadri, and L. v. Doorn, "Turtles all the way down: Research challenges in user-based attestation," in Proceedings of the 2nd USENIX workshop on Hot topics in security, Boston, MA, 2007, pp. 1-5.
-
(2007)
Proceedings of the 2nd USENIX workshop on Hot topics in security
, pp. 1-5
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Doorn, L.V.4
-
14
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
Breckenridge, CO, USA
-
S. Garriss, et al., "Trustworthy and personalized computing on public kiosks," in Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA, 2008, pp. 199-210.
-
(2008)
Proceeding of the 6th international conference on Mobile systems, applications, and services
, pp. 199-210
-
-
Garriss, S.1
-
15
-
-
77949701829
-
-
Available
-
Webcoverger. Available: http://webconverger.com/
-
Webcoverger
-
-
-
16
-
-
77949681496
-
-
Available
-
Cloud. Available: http://www.thinkgos.com/cloud/index.html
-
Cloud
-
-
-
17
-
-
77949674922
-
-
July 8, Available
-
S. Pichai and L. Upson. (2009, July 8). Google chrome os. Available: http://googleblog.blogspot.com/2009/07/introducing-google-chrome-os.html
-
(2009)
Google chrome os
-
-
Pichai, S.1
Upson, L.2
-
19
-
-
33845399252
-
Webos: Say goodbye to desktop applications
-
W. Aaron, "Webos: Say goodbye to desktop applications," netWorker, vol. 9, pp. 18-26, 2005.
-
(2005)
netWorker
, vol.9
, pp. 18-26
-
-
Aaron, W.1
-
20
-
-
70349086407
-
Isolating web programs in modern browser architectures
-
Nuremberg, Germany
-
C. Reis and S. D. Gribble, "Isolating web programs in modern browser architectures," in Proceedings of the fourth ACM european conference on Computer systems, Nuremberg, Germany, 2009, pp. 219-232.
-
(2009)
Proceedings of the fourth ACM european conference on Computer systems
, pp. 219-232
-
-
Reis, C.1
Gribble, S.D.2
-
21
-
-
50249182906
-
-
C. Grier, T. Shuo, and S. T. King, Secure web browsing with the op web browser, in Security and Privacy, 2008. SP 2008. IEEE Symposium on, 2008, pp. 402-416.
-
C. Grier, T. Shuo, and S. T. King, "Secure web browsing with the op web browser," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, 2008, pp. 402-416.
-
-
-
-
22
-
-
77955202352
-
The multi-principal os construction of the gazelle web browser,
-
MSR-TR-2009-16, 2009
-
H. Wang, et al., "The multi-principal os construction of the gazelle web browser," Microsoft Research Technical Report MSR-TR-2009-16, 2009.
-
Microsoft Research Technical Report
-
-
Wang, H.1
|