-
1
-
-
4043168634
-
The IBM PCIXCC: A new cryptograhic co-processor for the IBM eServer
-
T. Arnold and L. van Doorn. The IBM PCIXCC: A new cryptograhic co-processor for the IBM eServer. IBM Journal of Research and Development, 48:475-487, 2004.
-
(2004)
IBM Journal of Research and Development
, vol.48
, pp. 475-487
-
-
Arnold, T.1
Van Doorn, L.2
-
2
-
-
85013594843
-
Securing peer-to-peer networks using trusted computing
-
C. Mitchell, editor chapter 10. IEE
-
S. Balfe, A. Lakhani, and K. Paterson. Securing peer-to-peer networks using trusted computing. In C. Mitchell, editor, Trusted Computing, chapter 10. IEE, 2005.
-
(2005)
Trusted Computing
-
-
Balfe, S.1
Lakhani, A.2
Paterson, K.3
-
3
-
-
0242585280
-
Improving the efficiency and reliability of digital time-stamping
-
D. Bayer, S. Haber, and W. Stornetta. Improving the Efficiency and Reliability of Digital Time-Stamping. In Sequences II: Methods in Communication, Security, and Computer Science, pages 329-334, 1993.
-
(1993)
Sequences II: Methods in Communication, Security, and Computer Science
, pp. 329-334
-
-
Bayer, D.1
Haber, S.2
Stornetta, W.3
-
5
-
-
0036312254
-
Eliminating counterevidence with applications to accountable certificate management
-
A. Buldas, P. Laud, and H. Lipmaa. Eliminating Counterevidence with Applications to Accountable Certificate Management. Journal of Computer Security, 10:273-296, 2002. (Pubitemid 34814467)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 273-296
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
-
6
-
-
0345490611
-
Incremental multiset hash functions and their application to memory integrity checking
-
Springer-Verlag
-
D. Clarke, S. Devadas, M. van Dijk, B. Gassend, and G. E. Suh. Incremental Multiset Hash Functions and their Application to Memory Integrity Checking. In Advances in Cryptology - Asiacrypt 2003 Proceedings, volume 2894 of LNCS. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - Asiacrypt 2003 Proceedings, Volume 2894 of LNCS
-
-
Clarke, D.1
Devadas, S.2
Van Dijk, M.3
Gassend, B.4
Suh, G.E.5
-
7
-
-
34547179158
-
Certificate management using distributed trusted third parties
-
C. Mitchell, editor chapter 9. IEE
-
A. Dent and G. Price. Certificate management using distributed trusted third parties. In C. Mitchell, editor, Trusted Computing, chapter 9. IEE, 2005.
-
(2005)
Trusted Computing
-
-
Dent, A.1
Price, G.2
-
8
-
-
85013568530
-
An overview of trusted computing technology
-
C. Mitchell, editor chapter 3. IEE
-
E. Gallery. An overview of trusted computing technology. In C. Mitchell, editor, Trusted Computing, chapter 3. IEE, 2005.
-
(2005)
Trusted Computing
-
-
Gallery, E.1
-
10
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahala, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of the Second Conference on File and Storage Technologies (FAST 2003), 2003.
-
(2003)
Proceedings of the Second Conference on File and Storage Technologies (FAST 2003)
-
-
Kallahala, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
12
-
-
17544370316
-
Architectural support for copy and tamper resistant software
-
th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pages 168-177, November 2000. (Pubitemid 32470896)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
13
-
-
21644470487
-
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
-
Computer Science, Hanover, NH, December
-
J. Marchesini, S. W. Smith, O. Wild, and R. MacDonald. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003-476, Dartmouth College, Computer Science, Hanover, NH, December 2003.
-
(2003)
Technical Report TR2003-476, Dartmouth College
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
MacDonald, R.4
-
15
-
-
85013589618
-
-
The Institution of Electrical Engineers
-
C. Mitchell, editor. Trusted Computing. The Institution of Electrical Engineers, 2005.
-
(2005)
Trusted Computing
-
-
Mitchell, C.1
-
16
-
-
85013587012
-
An overview of NGSCB
-
C. Mitchell, editor chapter 4. IEE
-
M. Peinado, P. England, and Y. Chen. An overview of NGSCB. In C. Mitchell, editor, Trusted Computing, chapter 4. IEE, 2005.
-
(2005)
Trusted Computing
-
-
Peinado, M.1
England, P.2
Chen, Y.3
-
17
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proceedings 13th USENIX Security Symposium (San Diego, CA), 2004.
-
(2004)
Proceedings 13th USENIX Security Symposium (San Diego, CA)
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
19
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Nov.
-
L. F. G. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas. Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS. In Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06), Nov. 2006.
-
(2006)
Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06)
-
-
Sarmenta, L.F.G.1
Van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
23
-
-
34250204324
-
-
Trusted Computing Group. Mobile Phone Specifications. https://www.trustedcomputinggroup.org/specs/mobilephone/.
-
Mobile Phone Specifications
-
-
-
24
-
-
34547205365
-
-
Trusted Computing Group
-
Trusted Computing Group. TPM v1.2 specification changes. https://www.trustedcomputinggroup.org/groups/tpm/TPM-1-2-Changes-final.pdf, 2003.
-
(2003)
TPM V1.2 Specification Changes
-
-
-
26
-
-
79959547649
-
-
Technical report
-
M. van Dijk, L. Sarmenta, C. O'Donnell, J. Rhodes, and S. Devadas. Proof of Freshness: How to efficiently use on online single secure clock to secure shared untrusted memory. Technical report, 2006.
-
(2006)
Proof of Freshness: How to Efficiently use on Online Single Secure Clock to Secure Shared Untrusted Memory
-
-
Van Dijk, M.1
Sarmenta, L.2
O'Donnell, C.3
Rhodes, J.4
Devadas, S.5
-
27
-
-
79959566580
-
Securing shared untrusted storage by using TPM 1.2 without requiring a trusted OS
-
May
-
M. van Dijk, L. F. G. Sarmenta, J. Rhodes, and S. Devadas. Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS. Technical report, MIT CSAIL CSG Technical Memo 498, May 2007.
-
(2007)
Technical Report, MIT CSAIL CSG Technical Memo 498
-
-
Van Dijk, M.1
Sarmenta, L.F.G.2
Rhodes, J.3
Devadas, S.4
-
28
-
-
0004196480
-
-
PhD thesis, Carnegie Mellon University
-
B. S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.S.1
|