-
2
-
-
77957891863
-
-
Trusted computing group. http://www.trustedcomputinggroup.org.
-
-
-
-
5
-
-
57349085064
-
Model-based behavioral attestation
-
New York, NY, USA ACM
-
M. Alam, X. Zhang, M. Nauman, T. Ali, and J.-P. Seifert. Model-based behavioral attestation. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 175-184, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.-P.5
-
6
-
-
0037002089
-
Security challenges for the electricity infrastructure (supplement to computer magazine)
-
M. Amin. Security challenges for the electricity infrastructure (supplement to computer magazine). Computer, 35(4):8-10, 2002.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 8-10
-
-
Amin, M.1
-
7
-
-
31344435929
-
Cryptographic processors - A survey
-
Feb.
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov. Cryptographic processors - A survey. Proceedings of the IEEE, 94(2):357-369, Feb. 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
9
-
-
0242539792
-
A trusted process to digitally sign a document
-
New York, NY ACM
-
B. Balacheff, L. Chen, D. Plaquin, and G. Proudler. A trusted process to digitally sign a document. In 2001 Workshop on New Security Paradigms, pages 79-86, New York, NY, 2001. ACM.
-
(2001)
2001 Workshop on New Security Paradigms
, pp. 79-86
-
-
Balacheff, B.1
Chen, L.2
Plaquin, D.3
Proudler, G.4
-
10
-
-
0032593003
-
A fast distributed implementation of optimal power flow
-
August
-
R. Baldick, B. H. Kim, C. Chase, and Y. Luo. A fast distributed implementation of optimal power flow. IEEE Trans. On Power Sys., 14(3):858, August 1999.
-
(1999)
IEEE Trans. on Power Sys.
, vol.14
, Issue.3
, pp. 858
-
-
Baldick, R.1
Kim, B.H.2
Chase, C.3
Luo, Y.4
-
12
-
-
70349230089
-
E-EMV: Emulating EMV for internet payments with trusted computing technologies
-
ACM
-
S. Balfe and K. G. Paterson. e-EMV: emulating EMV for Internet payments with trusted computing technologies. In 3rd ACM workshop on Scalable trusted computing, pages 81-92. ACM, 2008.
-
(2008)
3rd ACM Workshop on Scalable Trusted Computing
, pp. 81-92
-
-
Balfe, S.1
Paterson, K.G.2
-
13
-
-
84910156435
-
VTPM virtualizing the trusted platform module
-
S. Berger, R. Cceres, K. A. Goldman, R. Perez, R. Sailer, and L. Doorn. vTPM virtualizing the trusted platform module. In 15th Usenix Security Symposium, pages 305-320, 2006.
-
(2006)
15th Usenix Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Doorn, L.6
-
14
-
-
0003400255
-
Integrity considerations for secure computer systems
-
04
-
K. J. Biba. Integrity considerations for secure computer systems. Technical report, MITRE Corp., 04 1977.
-
(1977)
Technical Report, MITRE Corp.
-
-
Biba, K.J.1
-
15
-
-
11244353165
-
Decentralised security constrained dc-opf of interconnected power systems
-
November
-
P. N. Biskas and A. G. Bakirtzis. Decentralised security constrained dc-opf of interconnected power systems. IEE Proc. Gener. Transm. Distrib., 151(6):747, November 2004.
-
(2004)
IEE Proc. Gener. Transm. Distrib.
, vol.151
, Issue.6
, pp. 747
-
-
Biskas, P.N.1
Bakirtzis, A.G.2
-
16
-
-
77249089045
-
Pbes: A policy based encryption system with application to data sharing in the power grid
-
New York, NY, USA ACM
-
R. Bobba, H. Khurana, M. AlTurki, and F. Ashraf. Pbes: a policy based encryption system with application to data sharing in the power grid. In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pages 262-275, New York, NY, USA, 2009. ACM.
-
(2009)
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 262-275
-
-
Bobba, R.1
Khurana, H.2
AlTurki, M.3
Ashraf, F.4
-
18
-
-
36348993230
-
Contingency filtering techniques for preventive security-constrained optimal power flow
-
November
-
F. Capitanescu, M. Glavic, D. Ernst, and L. Wehenkel. Contingency filtering techniques for preventive security-constrained optimal power flow. IEEE Trans. On Power Sys., 22(4):1690, November 2007.
-
(2007)
IEEE Trans. on Power Sys.
, vol.22
, Issue.4
, pp. 1690
-
-
Capitanescu, F.1
Glavic, M.2
Ernst, D.3
Wehenkel, L.4
-
19
-
-
58349104116
-
Secure storage using a sealing proxy
-
New York, NY, USA ACM
-
E. Cesena, G. Ramunno, and D. Vernizzi. Secure storage using a sealing proxy. In Proceedings of the 1st European Workshop on System Security, pages 27-34, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 1st European Workshop on System Security
, pp. 27-34
-
-
Cesena, E.1
Ramunno, G.2
Vernizzi, D.3
-
20
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology, pages 199-203, 1983.
-
(1983)
Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
22
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE Computer Society Press
-
D. D. Clark and D. R. Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
23
-
-
33749613601
-
Technical analysis of the august 14, 2003, blackout: What happened, why and what did we learn?
-
N. A. E. R. Council Princeton, NJ, July
-
N. A. E. R. Council. Technical analysis of the august 14, 2003, blackout: what happened, why and what did we learn? Technical report, NERC, Princeton, NJ, July 2004.
-
(2004)
Technical Report, NERC
-
-
-
24
-
-
33750992489
-
Running the manual: An approach to high-assurance microkernel development
-
New York, NY, USA ACM
-
P. Derrin, K. Elphinstone, G. Klein, D. Cock, and M. M. T. Chakravarty. Running the manual: an approach to high-assurance microkernel development. In Haskell '06: Proceedings of the 2006 ACM SIGPLAN workshop on Haskell, pages 60-71, New York, NY, USA, 2006. ACM.
-
(2006)
Haskell '06: Proceedings of the 2006 ACM SIGPLAN Workshop on Haskell
, pp. 60-71
-
-
Derrin, P.1
Elphinstone, K.2
Klein, G.3
Cock, D.4
Chakravarty, M.M.T.5
-
25
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
J. G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart. Building the IBM 4758 secure coprocessor. Computer, 34(10):57-66, October 2001.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
26
-
-
44049086023
-
AES-CBC + elephant diffuser: A disk encryption algorithm for windows vista
-
Aug
-
N. Ferguson. AES-CBC + elephant diffuser: A disk encryption algorithm for windows vista. Technical report, Microsoft, Aug 2006.
-
(2006)
Technical Report, Microsoft
-
-
Ferguson, N.1
-
27
-
-
0033690785
-
Lomac: Low water-mark integrity protection for cots environments
-
IEEE Computer Society
-
T. Fraser. Lomac: Low water-mark integrity protection for cots environments. In IEEE Symposium on Security and Privacy, pages 230-245. IEEE Computer Society, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
28
-
-
68149092220
-
Trusted computing: Security and applications
-
(to appear)
-
E. Gallery and C. J. Mitchell. Trusted computing: Security and applications. Cryptologia. (to appear).
-
Cryptologia
-
-
Gallery, E.1
Mitchell, C.J.2
-
29
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In 19th Symposium on Operating System Principles, pages 193-206. ACM Press, 2003.
-
(2003)
19th Symposium on Operating System Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
30
-
-
46449133585
-
Towards trustworthy kiosk computing
-
IEEE Computer Society
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Towards trustworthy kiosk computing. In Eighth IEEE Workshop on Mobile Computing Systems and Applications, pages 41-45. IEEE Computer Society, 2007.
-
(2007)
Eighth IEEE Workshop on Mobile Computing Systems and Applications
, pp. 41-45
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
31
-
-
28244453699
-
The conditions for obtaining feasible solutions to security-constrained unit commitment problems
-
November
-
X. Guan, S. Guo, and Q. Zhai. The conditions for obtaining feasible solutions to security-constrained unit commitment problems. IEEE Trans. On Power Sys., 20(4):1746, November 2005.
-
(2005)
IEEE Trans. on Power Sys.
, vol.20
, Issue.4
, pp. 1746
-
-
Guan, X.1
Guo, S.2
Zhai, Q.3
-
32
-
-
77952256837
-
Towards trustworthy computing systems: Taking microkernels to the next level
-
G. Heiser, K. Elphinstone, I. Kuz, G. Klein, and S. M. Petters. Towards trustworthy computing systems: taking microkernels to the next level. SIGOPS Oper. Syst. Rev., 41(4):3-11, 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.4
, pp. 3-11
-
-
Heiser, G.1
Elphinstone, K.2
Kuz, I.3
Klein, G.4
Petters, S.M.5
-
33
-
-
33947691568
-
The nizza secure-system architecture
-
H. Hrtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The nizza secure-system architecture. In In IEEE CollaborateCom 2005, 2005.
-
(2005)
IEEE CollaborateCom 2005
-
-
Hrtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
34
-
-
77950911306
-
Tutorial: Security in electric utility control systems
-
April
-
S. Hurd, R. Smith, and G. Leischner. Tutorial: Security in electric utility control systems. In Protective Relay Engineers, 2008 61st Annual Conference for, pages 304-309, April 2008.
-
(2008)
Protective Relay Engineers, 2008 61st Annual Conference For
, pp. 304-309
-
-
Hurd, S.1
Smith, R.2
Leischner, G.3
-
37
-
-
84938162642
-
Unit commitment
-
May
-
R. H. Kerr, J. L. Scheidt, A. J. Fontanna, and J. K. Wiley. Unit commitment. IEEE Trans. On Power Apparatus and Systems, PAS-85(5):417, May 1966.
-
(1966)
IEEE Trans. on Power Apparatus and Systems
, vol.PAS-85
, Issue.5
, pp. 417
-
-
Kerr, R.H.1
Scheidt, J.L.2
Fontanna, A.J.3
Wiley, J.K.4
-
38
-
-
84955566566
-
A privacy-enhanced peer-to-peer reputation system
-
Springer-Verlag
-
M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation system. In E-Commerce and Web Technologies, pages 206-215. Springer-Verlag, 2003.
-
(2003)
E-Commerce and Web Technologies
, pp. 206-215
-
-
Kinateder, M.1
Pearson, S.2
-
39
-
-
0036949385
-
Enabling trusted software integrity
-
New York, NY, USA ACM
-
D. Kirovski, M. Drinić, and M. Potkonjak. Enabling trusted software integrity. In ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, pages 108-120, New York, NY, USA, 2002. ACM.
-
(2002)
ASPLOS-X: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 108-120
-
-
Kirovski, D.1
Drinić, M.2
Potkonjak, M.3
-
40
-
-
38049026664
-
-
June
-
D. Kuhlmann, R. Landfermanny, H. V. Ramasamyz, M. Schunterz, G. Ramunno, and D. Vernizzi. An open trusted computing architecture secure virtual machines enabling user-defined policy enforcement, June 2006.
-
(2006)
An Open Trusted Computing Architecture Secure Virtual Machines Enabling User-Defined Policy Enforcement
-
-
Kuhlmann, D.1
Landfermanny, R.2
Ramasamyz, H.V.3
Schunterz, M.4
Ramunno, G.5
Vernizzi, D.6
-
41
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard- and software
-
New York, NY, USA ACM
-
U. Kühn, M. Selhorst, and C. Stüble. Realizing property-based attestation and sealing with commonly available hard- and software. In Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 50-57, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
44
-
-
33847789626
-
Camkes: A component model for secure microkernel-based embedded systems
-
I. Kuz, Y. Liu, I. Gorton, and G. Heiser. Camkes: A component model for secure microkernel-based embedded systems. J. Syst. Softw., 80(5):687-699, 2007.
-
(2007)
J. Syst. Softw.
, vol.80
, Issue.5
, pp. 687-699
-
-
Kuz, I.1
Liu, Y.2
Gorton, I.3
Heiser, G.4
-
46
-
-
0014750051
-
State estimation in power systems Part 2: Implementation and applications
-
R. E. Larson, W. F. Tinney, L. P. Hajdu, and D. S. Piercy. State estimation in power systems part 2: implementation and applications. IEEE Trans. On Power Appratus and Systems, page 353, 1970.
-
(1970)
IEEE Trans. on Power Appratus and Systems
, pp. 353
-
-
Larson, R.E.1
Tinney, W.F.2
Hajdu, L.P.3
Piercy, D.S.4
-
47
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. Mcgregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In 32nd International Symposium on Computer Architecture, pages 2-13, 2005.
-
(2005)
32nd International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
Mcgregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
48
-
-
38049040255
-
Enhancing grid security using trusted virtualization
-
Springer-Verlag, Berlin-Heidelberg
-
H. Lhr, H. V. Ramasamy, A. reza Sadeghi, S. Schulz, M. Schunter, and C. Stble. Enhancing grid security using trusted virtualization. In 2nd Workshop on Advances in Trusted Computing, pages 372-384. Springer-Verlag, Berlin-Heidelberg, 2006.
-
(2006)
2nd Workshop on Advances in Trusted Computing
, pp. 372-384
-
-
Lhr, H.1
Ramasamy, H.V.2
Reza Sadeghi, A.3
Schulz, S.4
Schunter, M.5
Stble, C.6
-
49
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Cambridge, MA, November
-
D. Lie, C. Thekkath, P. Lincoln, M. Mitchell, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, November 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Lincoln, P.3
Mitchell, M.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
50
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
DOI 10.1145/1179474.1179486, Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
W. Mao, F. Yan, and C. Chen. Daonity: grid security with behaviour conformity from trusted computing. In 1st ACM workshop on Scalable trusted computing, pages 43-46. ACM, 2006. (Pubitemid 47117275)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
53
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
Berkeley, CA, USA USENIX Association
-
J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn. Turtles all the way down: research challenges in user-based attestation. In HOTSEC'07: Proceedings of the 2nd USENIX workshop on Hot topics in security, pages 1-5, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HOTSEC'07: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security
, pp. 1-5
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Van Doorn, L.4
-
55
-
-
77957921279
-
-
New York Independent System Operator. Blackout august 14 February
-
New York Independent System Operator. Blackout august 14,2003 final report. NYISO, February 2005.
-
(2005)
2003 Final Report. NYISO
-
-
-
59
-
-
33646445517
-
NGSCB: A trusted open system
-
Springer
-
M. Peinado, Y. Chen, P. Engl, and J. Manferdelli. NGSCB: A trusted open system. In 9th Australasian Conference on Information Security and Privacy, pages 86-97. Springer, 2004.
-
(2004)
9th Australasian Conference on Information Security and Privacy
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
Engl, P.3
Manferdelli, J.4
-
60
-
-
0013347999
-
The PERSEUS system architecture
-
B. Pfitzmann, J. Riordan, C. Stble, M. Waidner, and A. Weber. The PERSEUS system architecture. Technical report, IBM Research Division, 2001. http://www.perseus-os.org/.
-
(2001)
Technical Report, IBM Research Division
-
-
Pfitzmann, B.1
Riordan, J.2
Stble, C.3
Waidner, M.4
Weber, A.5
-
62
-
-
77953490662
-
A secure modular mobile agent system
-
ACM Press
-
A. Pridgen, A. Pridgen, C. Julien, and C. Julien. A secure modular mobile agent system. In International Workshop on Software, pages 67-74. ACM Press, 2006.
-
(2006)
International Workshop on Software
, pp. 67-74
-
-
Pridgen, A.1
Pridgen, A.2
Julien, C.3
Julien, C.4
-
63
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
ACM Press
-
R. Sailer, T. Jaeger, X. Zhang, and L. V. Doorn. Attestation-based policy enforcement for remote access. In 11th ACM conference on Computer and Communications Security, pages 308-317. ACM Press, 2004.
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.V.4
-
65
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Oct.
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In ACM Symposium on Operating Systems Principles, pages 1-15, Oct. 2005.
-
(2005)
ACM Symposium on Operating Systems Principles
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
66
-
-
33748062337
-
Prima: Policy-reduced integrity measurement architecture
-
ACM Press
-
U. Shankar, T. Jaeger, T. Jaeger, R. Sailer, and R. Sailer. Prima: policy-reduced integrity measurement architecture. In 11th Symposium on Access Control Models and Technologies. ACM Press, 2006.
-
(2006)
11th Symposium on Access Control Models and Technologies
-
-
Shankar, U.1
Jaeger, T.2
Jaeger, T.3
Sailer, R.4
Sailer, R.5
-
67
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
E. Shi and A. Perrig. Bind: A fine-grained attestation service for secure distributed systems. In IEEE Symposium on Security and Privacy, pages 154-168, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
-
68
-
-
33646075344
-
Outbound authentication for programmable secure coprocessors
-
October
-
S. W. Smith. Outbound authentication for programmable secure coprocessors. International Journal of Information Security, 3(1):28-41, October 2004.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 28-41
-
-
Smith, S.W.1
-
71
-
-
24144433949
-
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
-
Kluwer Academic
-
A. Spalka, A. B. Cremers, and H. Langweg. Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs. In IFIP SEC, pages 403-420. Kluwer Academic, 2001.
-
(2001)
IFIP SEC
, pp. 403-420
-
-
Spalka, A.1
Cremers, A.B.2
Langweg, H.3
-
72
-
-
70349256468
-
Improving the scalability of platform attestation
-
New York, NY, USA ACM
-
F. Stumpf, A. Fuchs, S. Katzenbeisser, and C. Eckert. Improving the scalability of platform attestation. In STC '08: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 1-10, New York, NY, USA, 2008. ACM.
-
(2008)
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 1-10
-
-
Stumpf, F.1
Fuchs, A.2
Katzenbeisser, S.3
Eckert, C.4
-
73
-
-
37149044968
-
Aegis: A single-chip secure processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. IEEE Design & Test, 24(6):570-580, 2007.
-
(2007)
IEEE Design & Test
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
75
-
-
24644461219
-
Short linkable ring signatures for e-voting, e-cash and attestation
-
Springer
-
P. P. Tsang and V. K. Wei. Short linkable ring signatures for e-voting, e-cash and attestation. In Information Security Practice and Experience, pages 48-60. Springer, 2005.
-
(2005)
Information Security Practice and Experience
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
76
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
ACM
-
M. van Dijk, J. Rhodes, L. F. G. Sarmenta, and S. Devadas. Offline untrusted storage with immediate detection of forking and replay attacks. In ACM workshop on Scalable trusted computing, pages 41-48. ACM, 2007.
-
(2007)
ACM Workshop on Scalable Trusted Computing
, pp. 41-48
-
-
Van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
Devadas, S.4
-
78
-
-
50049107144
-
Outsourcing security analysis with anonymized logs
-
September
-
J. Zhang, N. Borisov, and W. Yurcik. Outsourcing security analysis with anonymized logs. In Securecomm and Workshops, 2006, pages 1-9, September 2006.
-
(2006)
Securecomm and Workshops, 2006
, pp. 1-9
-
-
Zhang, J.1
Borisov, N.2
Yurcik, W.3
|