-
3
-
-
0027941028
-
Mode security: An infrastructure for covert channel suppression. in
-
May
-
R. Browne. Mode security: An infrastructure for covert channel suppression. In IEEE Symposium on Research in Security and Privacy, pages 39-55, May 1994.
-
(1994)
IEEE Symposium on Research in Security and Privacy
, pp. 39-55
-
-
Browne, R.1
-
5
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. In CRYPTO, pages 199-203, 1982.
-
(1982)
CRYPTO
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
70449455866
-
Quantifying information flow with beliefs
-
M. R. Clarkson, A. C. Myers, and F. B. Schneider.Quantifying information flow with beliefs. Journal of Computer Security, 17(5):655-701, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.5
, pp. 655-701
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
7
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern x86 processors
-
B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter. Practical mitigations for timing-based side-channel attacks on modern x86 processors. IEEE Symposium on Security and Privacy, pages 45-60, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Coppens, B.1
Verbauwhede, I.2
Bosschere, K.D.3
Sutter, B.D.4
-
8
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
Dec
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 10(4), Dec. 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
-
-
Coppersmith, D.1
-
9
-
-
0016978244
-
Basic limits on protocol information in data communication networks
-
July
-
R. G. Gallagher. Basic limits on protocol information in data communication networks. IEEE Transactions on Information Theory, 22(4), July 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.4
-
-
Gallagher, R.G.1
-
10
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
Oct
-
S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In CCS '07, Oct. 2007.
-
(2007)
CCS '07
-
-
Gianvecchio, S.1
Wang, H.2
-
11
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
J. Giles and B. Hajek. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory, 48(9):2455-2477, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
13
-
-
0029707442
-
Several secure store and forward devices
-
Mar
-
D. M. Goldschlag. Several secure store and forward devices. In CCS '96, pages 129-137, Mar. 1996.
-
(1996)
CCS '96
, pp. 129-137
-
-
Goldschlag, D.M.1
-
15
-
-
0027719713
-
A pump for rapid, reliable, secure communication
-
Nov
-
M. H. Kang and I. S. Moskowitz. A pump for rapid, reliable, secure communication. In CCS '93, pages 119-129, Nov. 1993.
-
(1993)
CCS '93
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
17
-
-
0001297528
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Aug
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology-CRYPTO'96, Aug. 1996.
-
(1996)
Advances in Cryptology-CRYPTO'96
-
-
Kocher, P.1
-
18
-
-
70350561721
-
A provably secure and efficient countermeasure against timing attacks
-
July
-
B. Köpf and M. Dürmuth. A provably secure and efficient countermeasure against timing attacks. In 2009 IEEE Computer Security Foundations, July 2009.
-
(2009)
2009 IEEE Computer Security Foundations
-
-
Köpf, B.1
Dürmuth, M.2
-
19
-
-
77957606219
-
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
-
July
-
B. Köpf and G. Smith. Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In 2010 IEEE Computer Security Foundations, July 2010.
-
(2010)
2010 IEEE Computer Security Foundations
-
-
Köpf, B.1
Smith, G.2
-
20
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
B. W. Lampson. A note on the confinement problem. Comm. of the ACM, 16(10):613-615, Oct. 1973.
-
(1973)
Comm. of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
21
-
-
78549269294
-
Hide and seek in time-robust covert timing channels
-
Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, and S. Schulz. Hide and seek in time-robust covert timing channels. In ESORICS, 2009.
-
(2009)
ESORICS
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.4
Schulz, S.5
-
22
-
-
78650011363
-
Robust and undetectable steganographic timing channels for i.i.d. traffic
-
June
-
Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz, and S. Katzenbeisser. Robust and undetectable steganographic timing channels for i.i.d. traffic. In Information Hiding 2010, June 2010.
-
(2010)
Information Hiding 2010
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.4
Schulz, S.5
Katzenbeisser, S.6
-
33
-
-
84942242915
-
Observational determinism for concurrent program security
-
Pacific Grove, California, June
-
S. Zdancewic and A. C. Myers. Observational determinism for concurrent program security. In Proc. 16th IEEE Computer Security Foundations Workshop, pages 29-43,Pacific Grove, California, June 2003.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop
, pp. 29-43
-
-
Zdancewic, S.1
Myers, A.C.2
|