-
4
-
-
0003906999
-
-
Tech. Rep. RFC 1813, IETF, June
-
CALLAGHAN, B., PAWLOWSKI, B., AND STAUBACH, P. NFS Version 3 Protocol Specification. Tech. Rep. RFC 1813, IETF, June 1995.
-
(1995)
NFS Version 3 Protocol Specification
-
-
Callaghan, B.1
Pawlowski, B.2
Staubach, P.3
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
DIFFIE, W., VAN OORSCHOT, P. C., AND WIENER, M. J. Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 2 (1992), 107–125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
85077273873
-
-
freedb. http://www.freedb.org.
-
Freedb
-
-
-
9
-
-
21644455412
-
TerrA: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, October
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 193–206.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
HOWARD, J. H., KAZAR, M. L., MENEES, S. G., NICHOLS, D. A., SATYANARAYANAN, M., SIDEBOTHAM, R. N., AND WEST, M. J. Scale and performance in a distributed file system. ACM Transactions on Computer Systems 6, 1 (February 1988).
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, pp. 1
-
-
Howard, J.H.1
Kazar, M.L.2
Menees, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Sidebotham, R.N.6
West, M.J.7
-
11
-
-
33144475784
-
Wormhole attacks in wireless networks
-
February
-
HU, Y.-C., PERRIG, A., AND JOHNSON, D. B. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24, 2 (February 2006), 370–380.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
San Francisco, CA, December
-
LI, J., KROHN, M., MAZIÈRES, D., AND SHASHA, D. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 121–136.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
15
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
Bolton Landing, NY
-
LIE, D., THEKKATH, C. A., AND HOROWITZ, M. Implementing an untrusted operating system on trusted hardware. In Proceedingsofthe19thACMSymposiumonOperatingSystemsPrinciples (Bolton Landing, NY, 2003), pp. 178–192.
-
(2003)
Proceedingsofthe19thACMSymposiumonOperatingSystemsPrinciples
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
16
-
-
0042352260
-
Separating key management from file system security
-
Kiawah Island, SC, December
-
MAZIÈRES, D., KAMINSKY, M., KAASHOEK, M. F., AND WITCHEL, E. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (Kiawah Island, SC, December 1999), pp. 124–139.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
17
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
Boston, MA, June
-
MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Bump in the ether: A framework for securing sensitive user input. In Proceedings of the USENIX 2006 Annual Technical Conference (Boston, MA, June 2006).
-
(2006)
Proceedings of the USENIX 2006 Annual Technical Conference
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
18
-
-
85077248135
-
-
MICROSOFT. Share Audio Files Zune to Zune. http://www.zune.net/en-us/support/howto/zunetozune/ sharesongs.htm.
-
Share Audio Files Zune to Zune
-
-
-
20
-
-
85077265188
-
-
September
-
MOTOROLA. Motorola E680, September 2004. http://www.motorola.com/us/products.jsp.
-
(2004)
Motorola E680
-
-
-
21
-
-
79955976064
-
Exploiting weak connectivity in mobile file access
-
Copper Mountain, CO, Dec
-
MUMMERT, L., EBLING, M., AND SATYANARAYANAN, M. Exploiting weak connectivity in mobile file access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995).
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
-
-
Mummert, L.1
Ebling, M.2
Satyanarayanan, M.3
-
22
-
-
84874790838
-
Energy-efficiency and storage flexibility in the blue file system
-
San Francisco, CA, December
-
NIGHTINGALE, E. B., AND FLINN, J. Energy-efficiency and storage flexibility in the Blue File System. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 363–378.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, pp. 363-378
-
-
Nightingale, E.B.1
Flinn, J.2
-
23
-
-
84874802830
-
Ensemblue: Integrating consumer electronics and distributed storage
-
Seattle, WA, November
-
PEEK, D., AND FLINN, J. EnsemBlue: Integrating consumer electronics and distributed storage. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Seattle, WA, November 2006), pp. 219–232.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 219-232
-
-
Peek, D.1
Flinn, J.2
-
24
-
-
19544393220
-
Opportunistic annexing for handheld devices: Opportunities and challenges
-
PIERCE, J. S., AND MAHANEY, H. Opportunistic annexing for handheld devices: Opportunities and challenges. In Proceedings of HCIC (2004).
-
(2004)
Proceedings of HCIC
-
-
Pierce, J.S.1
Mahaney, H.2
-
25
-
-
0242613544
-
Digibox: A self-protecting container for information commerce
-
New York, New York
-
SIBERT, O., BERNSTEIN, D., AND WIE, D. V. Digibox: A self-protecting container for information commerce. In Proceedings of the first USENIX Workshop on Electronic Commerce (New York, New York, 1995).
-
(1995)
Proceedings of the First USENIX Workshop on Electronic Commerce
-
-
Sibert, O.1
Bernstein, D.2
Wie, D.V.3
-
28
-
-
36348999066
-
-
Tech. rep., Trusted Computing Group, March
-
TCG TPM Specification Version 1.2 Revision 94. Tech. rep., Trusted Computing Group, March 2006. https://www.trustedcomputinggroup.org/specs/TPM.
-
(2006)
TCG TPM Specification Version 1.2 Revision 94
-
-
-
29
-
-
46749157344
-
-
Tech. Rep. RJ10368, IBM, June
-
TEWARI, R., HASWELL, J. M., NAIK, M. P., AND PARKES, S. M. Glamour: A Wide-Area Filesystem Middleware Using NFSv4. Tech. Rep. RJ10368, IBM, June 2005.
-
(2005)
Glamour: A Wide-Area Filesystem Middleware Using NFSv4
-
-
Tewari, R.1
Haswell, J.M.2
Naik, M.P.3
Parkes, S.M.4
-
30
-
-
85077262091
-
-
Yahoo! Music Unlimited. http://music.yahoo.com/unlimited/.
-
-
-
|