-
3
-
-
74049091912
-
Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
-
ACM
-
M. J. Atallah, E. D. Bryant, J. T. Korb, and J. R. Rice. Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity. In VMSEC'08. ACM, 2008.
-
(2008)
VMSEC'08
-
-
Atallah, M.J.1
Bryant, E.D.2
Korb, J.T.3
Rice, J.R.4
-
4
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
Berkeley, CA, USA, USENIX Association
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
8
-
-
49049105769
-
Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal. Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In 2008 IEEE International Conference on RFID, pages 58-64, 2008.
-
(2008)
2008 IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings on Advances in Cryptology (CRYPTO'86), pages 186-194. Springer-Verlag, 1987.
-
(1987)
Proceedings on Advances in Cryptology (CRYPTO'86)
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
38049015807
-
Fpga intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the 9th Cryptographic Hardware and Embedded Systems Workshop (CHES), pages 63-80, 2007.
-
(2007)
Proceedings of the 9th Cryptographic Hardware and Embedded Systems Workshop (CHES)
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
17
-
-
48149093328
-
Physical unclonable functions and public-key crypto for FPGA IP protection
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls. Physical unclonable functions and public-key crypto for FPGA IP protection. In International Conference on Field Programmable Logic and Applications, pages 189-195, 2007.
-
(2007)
International Conference on Field Programmable Logic and Applications
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
19
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Trans. Comput., 55(9):1081-1088, 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
26
-
-
78349288790
-
-
M. Riley and I. Richardson. Reed-solomon codes. http://www.cs.cmu.edu/ afs/cs.cmu.edu/project/pscico-guyb/realworld/www/reedsolomon/reed-solomon-codes. html, 1998.
-
(1998)
Reed-solomon Codes
-
-
Riley, M.1
Richardson, I.2
-
28
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn. Attestation-based policy enforcement for remote access. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pages 308-317. ACM Press, 2004. (Pubitemid 40338212)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Van Doorn, L.4
-
30
-
-
56349171224
-
Remote attestation on legacy operating systems with trusted platform modules
-
D. Schellekens, B. Wyseur, and B. Preneel. Remote attestation on legacy operating systems with trusted platform modules. In Science of Computer Programming, pages 13-22, 2008.
-
(2008)
Science of Computer Programming
, pp. 13-22
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
31
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas. Physcal unclonable functions for device authentication and secret key generation. In Proceedings of the 44th IEEE Design Automation Conference (DAC), pages 9-14. IEEE Press, 2007. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
32
-
-
23444439038
-
AEGIS: A single-chip secure processor
-
DOI 10.1016/j.istr.2005.05.002, PII S1363412705000208
-
G. E. Suh, C. W. O'Donnell, and S. Devadas. AEGIS: A single-chip secure processor. In Elsevier Information Security Technical Report, volume 10, pages 63-73, 2005. (Pubitemid 41108379)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.2
, pp. 63-73
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
33
-
-
37149044968
-
Aegis: A single-chip secure processor
-
DOI 10.1109/MDT.2007.179
-
G. E. Suh, C. W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. IEEE Design and Test of Computers, 24(6):570-580, 2007. (Pubitemid 350253575)
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
ODonnell, C.W.2
Devadas, S.3
-
34
-
-
79952789838
-
Trusted computing group
-
October
-
Trusted Computing Group. Trusted Platform Module Main Specification. http://www.trustedcomputinggroup.org/, October 2003.
-
(2003)
Trusted Platform Module Main Specification
-
-
-
35
-
-
79952782427
-
2010 Data breach investigations report
-
Verizon RISK Team. 2010 data breach investigations report. Technical report, 2010.
-
(2010)
Technical Report, Verizon RISK Team
-
-
|