-
1
-
-
0018995481
-
Preventing Software Piracy with Crypto-Microprocessors
-
RM Best, "Preventing Software Piracy with Crypto- Microprocessors", in Proceedings of IEEE Spring COMPCON 80, pp 466-469.
-
Proceedings of IEEE Spring COMPCON
, vol.80
, pp. 466-469
-
-
Best, R.M.1
-
2
-
-
0004743526
-
The smart card: A standardized security device dedicated to public cryptology
-
Gustavus J Simmons, editor, IEEE Press, Piscataway, NJ
-
L C. Guillou, M. Ugon, and JJ. Quisquater, "The smart card: A standardized security device dedicated to public cryptology", In Gustavus J Simmons, editor, Contemporary cryptology: The science of information integrity, IEEE Press, Piscataway, NJ, 1992.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
-
-
Guillou, L.C.1
Ugon, M.2
Quisquater, J.J.3
-
3
-
-
21644434531
-
Dyad: A system for using physically secure coprocessors
-
J. D. Tygar and B. Yee, "Dyad: A system for using physically secure coprocessors", In Proc. of IP Workshop, 1994.
-
Proc. of IP Workshop, 1994
-
-
Tygar, J.D.1
Yee, B.2
-
4
-
-
0025438148
-
ABYSS: An Architecture for Software Protection
-
June
-
S.R. White and L. Comerford, "ABYSS: An Architecture for Software Protection", IEEE Transactions on Software Engineering, vol. 16, no. 6, June 1990, pp. 619-629.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 619-629
-
-
White, S.R.1
Comerford, L.2
-
5
-
-
0343421180
-
Introduction to the Citadel architecture: Security in physically exposed environments
-
Distributed Systems Security Group, IBM T.J. Watson Research Center, March
-
S.R. White, S.H. Weingart, W.C. Arnold, E.R. Palmer, Introduction to the Citadel architecture: security in physically exposed environments, Technical Report RC 16672, Distributed Systems Security Group, IBM T.J. Watson Research Center, March 1991.
-
(1991)
Technical Report RC 16672
-
-
White, S.R.1
Weingart, S.H.2
Arnold, W.C.3
Palmer, E.R.4
-
7
-
-
77950564477
-
-
CHRYSALIS-ITS HOME PAGE: HTTP://WWW.CHRYSALIS-ITS.COM
-
-
-
-
10
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, S. Smith, L. van Doorn, and S. Weingart, "Building the IBM 4758 secure coprocessor", IEEE Computer, 34:57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Smith, S.5
Van Doorn, L.6
Weingart, S.7
-
14
-
-
0031177289
-
Remote Auditing of Software Outputs Using a Trusted Coprocessor
-
B. Schneier and J. Kelsey, "Remote Auditing of Software Outputs Using a Trusted Coprocessor", Journal of Future Generation Computer Systems, v.13, n.1, 1997, pp. 9-18.
-
(1997)
Journal of Future Generation Computer Systems
, vol.13
, Issue.1
, pp. 9-18
-
-
Schneier, B.1
Kelsey, J.2
-
15
-
-
34247369863
-
Using secure coprocessors for privacy preserving collaborative data mining and analysis
-
B. Bhattacharjee, N. Abe, K. Goldman, B. Zadrozny, V. R. Chillakuru, M. del Carpio, and C. Apte, "Using secure coprocessors for privacy preserving collaborative data mining and analysis", in DaMoN '06, 2006.
-
(2006)
DaMoN '06
-
-
Bhattacharjee, B.1
Abe, N.2
Goldman, K.3
Zadrozny, B.4
Chillakuru, V.R.5
Del Carpio, M.6
Apte, C.7
-
19
-
-
77950562201
-
Accountability as a Way Forward for Privacy Protection in the Cloud
-
S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud", HP Labs Technical Report, HPL-2009-2178, http://www.hpl.hp.com/techreports/2009/HPL-2009-178.pdf (2009)
-
(2009)
HP Labs Technical Report
-
-
Pearson, S.1
Charlesworth, A.2
-
21
-
-
77950571712
-
-
http://www.schneier.com/blog/archives/2009/07/homomorphic-enc.html
-
-
-
-
23
-
-
33847286901
-
PATRIOT - A Policy-Based, Multilevel Security Protocol for Safekeeping Audit Logs on Wireless Devices
-
W. Itani, A. Kayssi, and A. Chehab, "PATRIOT - a Policy-Based, Multilevel Security Protocol for Safekeeping Audit Logs on Wireless Devices," in Proc. of IEEE SecureComm'05), September 2005, Athens, Greece.
-
Proc. of IEEE SecureComm'05, September 2005, Athens, Greece
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
24
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proc. 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, 2003.
-
Proc. 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, 2003
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
25
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener, "Authentication and authenticated key exchanges", Designs, Codes and Cryptography 2 (1992), 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
|