-
2
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. ACM Trans. on Storage, 2006, 2(2): 107-138.
-
(2006)
ACM Trans. on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
3
-
-
0003851399
-
-
Wu SZ, Zhu SX, Zhang WZ, Trans. Beijing: China Machine Press, (in Chinese)
-
Schneier B, Wrote; Wu SZ, Zhu SX, Zhang WZ, Trans. Applied Cryptography-Protocols, Algorithms, and Source Code in C (Second Edition). Beijing: China Machine Press, 2006 (in Chinese).
-
(2006)
Applied Cryptography-Protocols, Algorithms, and Source Code in C (Second Edition)
-
-
Schneier, B.1
-
4
-
-
26444482007
-
Designing secure indexes for encrypted databases
-
LNCS 3654, Heidelberg, Berlin: Springer-Verlag
-
Shmueli E, Waisenberg R, Elovici Y, Gudes E. Designing secure indexes for encrypted databases. In: Proc. of the IFIP Conf. on Database and Applications Security. LNCS 3654, Heidelberg, Berlin: Springer-Verlag, 2005. 54-68.
-
(2005)
Proc. of the IFIP Conf. on Database and Applications Security
, pp. 54-68
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
5
-
-
33750247597
-
Privacy-Preserving queries on encrypted data
-
LNCS 4189, Heidelberg, Berlin: Springer-Verlag
-
Yang ZQ, Zhong S, Wright RN. Privacy-Preserving queries on encrypted data. In: Proc. of the 11th European Symp. on Research in Computer Security. LNCS 4189, Heidelberg, Berlin: Springer-Verlag, 2006. 479-495.
-
(2006)
Proc. of the 11th European Symp. on Research in Computer Security
, pp. 479-495
-
-
Yang, Z.Q.1
Zhong, S.2
Wright, R.N.3
-
6
-
-
0019573099
-
A database encryption system with subkeys
-
doi: 10.1145/319566.319580
-
Davida GI, Wells DL, Kam JB. A database encryption system with subkeys. ACM Trans. on Database Systems, 1981, 6(2):312-328. [doi: 10.1145/319566.319580]
-
(1981)
ACM Trans. on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
New York: ACM Press
-
Hacigümüs H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database service provider model. In: Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2002. 216-227.
-
(2002)
Proc. of the ACM SIGMOD Conf
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
10
-
-
85065578926
-
A privacy-preserving index for range queries
-
In: Nascimento MA, -zsu MT, Kossmann D, Miller, Blakeley RJJA, Schiefer KB, eds, New York: ACM Press
-
Hore B, Mehrotra S, Tsudik G. A privacy-preserving index for range queries. In: Nascimento MA, -zsu MT, Kossmann D, Miller, Blakeley RJJA, Schiefer KB, eds. Proc. of the 13th Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2004. 720-731.
-
(2004)
Proc. of the 13th Int'l Conf. on Very Large Data Bases
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
13
-
-
26444524370
-
Efficiency, security trade-off in supporting range queries on encrypted databases
-
LNCS 3654, Heidelberg, Berlin: Springer-Verlag
-
Li J, Omiecinski ER. Efficiency, security trade-off in supporting range queries on encrypted databases. In: Proc. of the IFIP Conf. on Database and Applications Security. LNCS 3654, Heidelberg, Berlin: Springer-Verlag, 2005. 69-83.
-
(2005)
Proc. of the IFIP Conf. on Database and Applications Security
, pp. 69-83
-
-
Li, J.1
Omiecinski, E.R.2
-
14
-
-
84991010622
-
Anti-Tamper databases: Processing aggregate queries over encrypted databases
-
LNCS 4127, Heidelberg, Berlin: Springer-Verlag
-
Chung SS, Ozsoygolu G. Anti-Tamper databases: Processing aggregate queries over encrypted databases. In: Proc. of the 22nd Int'l Conf. on Data Engineering Workshops. LNCS 4127, Heidelberg, Berlin: Springer-Verlag, 2006. 89-103.
-
(2006)
Proc. of the 22nd Int'l Conf. on Data Engineering Workshops
, pp. 89-103
-
-
Chung, S.S.1
Ozsoygolu, G.2
-
15
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
-
Ge TJ, Zdonik SB. Answering aggregation queries in a secure system model. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 519-530.
-
(2007)
Proc. of the 33rd Int'l Conf. on Very Large Data Bases
, pp. 519-530
-
-
Ge, T.J.1
Zdonik, S.B.2
-
16
-
-
33646793324
-
Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses
-
LNCS 3790, Heidelberg, Berlin: Springer-Verlag
-
Emekci F, Agrawal D, ElAbbadi AE. Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses. In: Proc. of ACM/IFIP/USENIX the 6th Int'l Middleware Conf. LNCS 3790, Heidelberg, Berlin: Springer-Verlag, 2005. 21-41.
-
(2005)
Proc. of ACM/IFIP/USENIX the 6th Int'l Middleware Conf
, pp. 21-41
-
-
Emekci, F.1
Agrawal, D.2
ElAbbadi, A.E.3
-
17
-
-
33749610153
-
Privacy preserving query processing using third parties
-
In: Barga RS, Zhou XF, eds. Washington: IEEE Computer Society Press
-
Emekci F, Agrawal D, Abbadi AE, Gulbeden A. Privacy preserving query processing using third parties. In: Barga RS, Zhou XF, eds. Proc. of the Int'l Conf. on Data Engineering. Washington: IEEE Computer Society Press, 2006. 27.
-
(2006)
Proc. of the Int'l Conf. on Data Engineering
, pp. 27
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
18
-
-
77953275954
-
-
Harbin: Heilongjiang Education Press, (in Chinese)
-
Cao ZF. The Public Cryptography. Harbin: Heilongjiang Education Press, 1993. 158-195 (in Chinese).
-
(1993)
The Public Cryptography
, pp. 158-195
-
-
Cao, Z.F.1
-
19
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
New York: ACM Press
-
Pang H, Jain A, Ramamritham K, Tan KL. Verifying completeness of relational query results in data publishing. In: Ozcan F, ed. Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2005. 407-418.
-
(2005)
Proc. of the ACM SIGMOD Conf
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.L.4
-
22
-
-
33745528450
-
Authentication of outsourced database using signature aggregation and chaining
-
In: Lee ML, Tan KL, eds. LNCS 3882, Heidelberg, Berlin: Springer-Verlag
-
Narasimha M, Tsudik G. Authentication of outsourced database using signature aggregation and chaining. In: Lee ML, Tan KL, eds. Proc. of the 11th Int'l Conf. on Database Systems for Advanced Application. LNCS 3882, Heidelberg, Berlin: Springer-Verlag, 2006, 420-436.
-
(2006)
Proc. of the 11th Int'l Conf. on Database Systems for Advanced Application
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
23
-
-
79952940395
-
Secure data outsourcing
-
In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
-
Sion R. Secure data outsourcing. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 1431-1432.
-
(2007)
Proc. of the 33rd Int'l Conf. on Very Large Data Bases
, pp. 1431-1432
-
-
Sion, R.1
-
24
-
-
84997556980
-
Integrity audit of outsourced data
-
In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
-
Xie M, Wang HS, Yin J, Meng XF. Integrity audit of outsourced data. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 782-793.
-
(2007)
Proc. of the 33rd Int'l Conf. on Very Large Data Bases
, pp. 782-793
-
-
Xie, M.1
Wang, H.S.2
Yin, J.3
Meng, X.F.4
-
25
-
-
43349091759
-
Providing freshness guarantees for outsourced databases
-
In: Kemper A, Valduriez P, Mouaddib N, Teubner J, Bouzeghoub M, Markl V, Amsaleg L, Manolescu I, eds. Vol.261. New York: ACM Press
-
Xie M, Wang HX, Yin J, Meng XF. Providing freshness guarantees for outsourced databases. In: Kemper A, Valduriez P, Mouaddib N, Teubner J, Bouzeghoub M, Markl V, Amsaleg L, Manolescu I, eds. Proc. of the 11th Int'l Conf. on Extending Database Technology: Advances in Database Technology, Vol.261. New York: ACM Press, 2008. 323-332.
-
(2008)
Proc. of the 11th Int'l Conf. on Extending Database Technology: Advances in Database Technology
, pp. 323-332
-
-
Xie, M.1
Wang, H.X.2
Yin, J.3
Meng, X.F.4
-
26
-
-
33745601730
-
Query execution assurance for outsourced database
-
In: Bohm K, Jensen CS, eds. New York: ACM Press
-
Sion R. Query execution assurance for outsourced database. In: Bohm K, Jensen CS, eds. Proc. of the 31st Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2005. 601-612.
-
(2005)
Proc. of the 31st Int'l Conf. on Very Large Data Bases
, pp. 601-612
-
-
Sion, R.1
-
28
-
-
58149462240
-
Partially materialized digest scheme: An efficient verification method for outsourced databases
-
doi: 10.1007/s00778-008-0108-z
-
Mouratidis K, Sacharidis D. Pang H. Partially materialized digest scheme: An efficient verification method for outsourced databases. The VLDB Journal, 2009, 18(1):363-381. [doi: 10.1007/s00778-008-0108-z]
-
(2009)
The VLDB Journal
, vol.18
, Issue.1
, pp. 363-381
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
29
-
-
40049111546
-
Verifying completeness of relational query answers from online servers
-
doi: 10.1145/1330332.1330337
-
Pang H, Tan KL. Verifying completeness of relational query answers from online servers. ACM Trans. on Information and System Security, 2008, 11(2):1-50. [doi: 10.1145/1330332.1330337]
-
(2008)
ACM Trans. on Information and System Security
, vol.11
, Issue.2
, pp. 1-50
-
-
Pang, H.1
Tan, K.L.2
-
31
-
-
0032201622
-
Private information retrieval
-
doi: 10.1145/293347.293350
-
Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. Journal of the ACM, 1998, 45(6):965-982. [doi: 10.1145/293347.293350]
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
32
-
-
70350677619
-
1/3) lower bound for bilinear group-based private information retrieval
-
doi: 10.4086/toc.2007.v003a012
-
1/3) lower bound for bilinear group-based private information retrieval. Theory of Computing, 2007, 3(1):221-238. [doi: 10.4086/toc.2007.v003a012]
-
(2007)
Theory of Computing
, vol.3
, Issue.1
, pp. 221-238
-
-
Razborov, A.A.1
Yekhanin, S.2
-
33
-
-
34547151180
-
Robust information-theoretic private information retrieval
-
Beime A, Stahl Y. Robust information-theoretic private information retrieval. Journal of Cryptology, 2002, 20(3):295-321.
-
(2002)
Journal of Cryptology
, vol.20
, Issue.3
, pp. 295-321
-
-
Beime, A.1
Stahl, Y.2
-
34
-
-
84872370949
-
Java implementation of a single-database computationally symmetric private information retrieval (cSPIR) protocol
-
Technical Report, YALEU/DCS/TR-1333, Department of Computer Science, Yale University
-
Saint-Jean F. Java implementation of a single-database computationally symmetric private information retrieval (cSPIR) protocol. Technical Report, YALEU/DCS/TR-1333, Department of Computer Science, Yale University, 2005.
-
(2005)
-
-
Saint-Jean, F.1
-
35
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Aggarwal G, Bawa M, Ganesan P, Garcia-Molina H, Kenthapadi K, Motwani R, Srivastava U, Thomas D, Xu Y. Two can keep a secret: A distributed architecture for secure database services. In: Proc. of the 2nd Biennial Conf. on Innovative Data Systems Research. 2005. 186-199.
-
(2005)
Proc. of the 2nd Biennial Conf. on Innovative Data Systems Research
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
36
-
-
21144442219
-
A survey on private information retrieval
-
Gasarch W. A survey on private information retrieval. Bulletin of the EATCS, 2004, 82:72-107.
-
(2004)
Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
37
-
-
40549114927
-
Towards 3-query locally decodable codes of subexponential length
-
Yekhanin S. Towards 3-query locally decodable codes of subexponential length. Journal of the ACM, 2008, 55(1):1-16.
-
(2008)
Journal of the ACM
, vol.55
, Issue.1
, pp. 1-16
-
-
Yekhanin, S.1
-
38
-
-
51749087083
-
Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers
-
Washington: IEEE Computer Society Press
-
Kedlaya KS, Yekhanin S. Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers. In: Proc. of the 2008 IEEE 23rd Annual Conf. on Computational Complexity. Washington: IEEE Computer Society Press, 2007. 175-186.
-
(2007)
Proc. of the 2008 IEEE 23rd Annual Conf. on Computational Complexity
, pp. 175-186
-
-
Kedlaya, K.S.1
Yekhanin, S.2
-
39
-
-
85141026002
-
On the computational practicality of private information retrieval
-
Sion R, Carbunar B. On the computational practicality of private information retrieval. 2007. http://citeseerx.ist.psu.edu/viewdoc/ summary-doi=10.1.1.70.793
-
(2007)
-
-
Sion, R.1
Carbunar, B.2
-
40
-
-
34548787882
-
Improving the robustness of private information retrieval
-
Washington: IEEE Computer Society Press
-
Goldberg I. Improving the robustness of private information retrieval. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society Press, 2007. 131-148.
-
(2007)
Proc. of the 2007 IEEE Symp. on Security and Privacy
, pp. 131-148
-
-
Goldberg, I.1
-
41
-
-
33244469997
-
Key management for multi-user encrypted databases
-
New York: ACM Press
-
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Key management for multi-user encrypted databases. In: Proc. of the ACM Workshop on Storage Security and Survivability. New York: ACM Press, 2005. 74-83.
-
(2005)
Proc. of the ACM Workshop on Storage Security and Survivability
, pp. 74-83
-
-
Damiani, E.1
De Capitani, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
42
-
-
77953241139
-
Key management method for cryptographically enforced access control
-
Zych A, Petkovi M. Key management method for cryptographically enforced access control. 2006. https://www.cosic.esat.kuleuven. be/wissec2006/papers/5.pdf
-
(2006)
-
-
Zych, A.1
Petkovi, M.2
-
44
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
New York: ACM Press
-
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. A data outsourcing architecture combining cryptography and access control. In: Proc. of the ACM Workshop on Computer Security Architecture. New York: ACM Press, 2007. 63-69.
-
(2007)
Proc. of the ACM Workshop on Computer Security Architecture
, pp. 63-69
-
-
De Capitani, V.S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
45
-
-
85011043313
-
Over-Encryption: Management of access control evolution on outsourced data
-
In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
-
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-Encryption: Management of access control evolution on outsourced data. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 123-134.
-
Proc. of the 33rd Int'l Conf. on Very Large Data Bases
-
-
De Capitani, V.S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
46
-
-
33846573849
-
Selective data encryption in outsourced dynamic environments
-
doi: 10.1016/j.entcs.2006.11.003
-
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective data encryption in outsourced dynamic environments. Electronic Notes in Theoretical Computer Science, 2007, 168:127-14. [doi: 10.1016/j.entcs.2006.11.003]
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.168
, pp. 127-14
-
-
Damiani, E.1
De Capitani, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
47
-
-
33646129220
-
Metadata management in outsourced encrypted databases
-
In: Jonker W, Petkovic M, eds. LNCS 3674, Heidelberg: Springer-Verlag
-
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Metadata management in outsourced encrypted databases. In: Jonker W, Petkovic M, eds. Proc. of the 4th VLDB Workshop on Secure Data Management (SDM 2007). LNCS 3674, Heidelberg: Springer-Verlag, 2007. 16-32.
-
(2007)
Proc. of the 4th VLDB Workshop on Secure Data Management (SDM 2007)
, pp. 16-32
-
-
Damiani, E.1
De Capitani, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
48
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
New York: ACM Press
-
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Pelosi G, Samarati P. Preserving confidentiality of security policies in data outsourcing. In: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2008. 75-84.
-
(2008)
Proc. of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 75-84
-
-
De Capitani, V.S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
49
-
-
85009120801
-
Controlling access to published data using cryptography
-
In: Freytag JC, Lockemann PC, eds. Berlin: VLDB Endowment
-
Miklau G, Suciu D. Controlling access to published data using cryptography. In: Freytag JC, Lockemann PC, eds. Proc. of the 29th VLDB. Berlin: VLDB Endowment, 2003. 898-909.
-
(2003)
Proc. of the 29th VLDB
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
51
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
doi: 10.1145/357369.357372
-
Akl SG, Taylor PD. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer System, 1983, 1(3):239-248. [doi: 10.1145/357369.357372]
-
(1983)
ACM Trans. on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
52
-
-
35448952234
-
Ghostdb: Querying visible and hidden data without leaks
-
In: Chan CY, Ooi BC, Zhou AY, eds. New York: ACM Press
-
Anciaux N, Benzine M, Bouganim L, Pucheral P, Shasha D. Ghostdb: Querying visible and hidden data without leaks. In: Chan CY, Ooi BC, Zhou AY, eds. Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2007. 677-688.
-
(2007)
Proc. of the ACM SIGMOD Conf
, pp. 677-688
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Pucheral, P.4
Shasha, D.5
-
53
-
-
54249165796
-
-
Zhao B, Yan F, Yu FJ, Trans. Beijing: China Machine Press, (in Chinese)
-
Challenger D, Yoder K, Catherman R, Stafford D, Van Doorn L, Wrote; Zhao B, Yan F, Yu FJ, Trans. A Practical Guide to Trust Computing. Beijing: China Machine Press, 2009. 9-30 (in Chinese).
-
(2009)
A Practical Guide to Trust Computing
, pp. 9-30
-
-
Challenger, D.1
Yoder, K.2
Catherman, R.3
Stafford, D.4
Van Doorn L5
-
54
-
-
34547317243
-
Trusted hardware: Can it be trustworthy
-
New York: ACM Press
-
Sion R. Trusted hardware: Can it be trustworthy- In: Proc. of the 44th Annual Design Automation Conf. New York: ACM Press, 2007. 1-4.
-
(2007)
Proc. of the 44th Annual Design Automation Conf
, pp. 1-4
-
-
Sion, R.1
|