-
1
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 65-71, Oakland, CA, May 1997. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
2
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
M. Matsui, editor chapter 40 Springer Berlin Heidelberg, Berlin, Heidelberg
-
F. Armknecht, R. Maes, A.-R. Sadeghi, B. Sunar, and P. Tuyls. Memory leakage-resilient encryption based on physically unclonable functions. In M. Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, volume 5912, chapter 40, pages 685-702. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
-
(2009)
Advances in Cryptology - ASIACRYPT 2009
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
4
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer-Verlag, Berlin Germany
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT '2004, Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT '2004, Lecture Notes in Computer Science
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
5
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
DOI 10.1109/2.955100
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEEC, 34(10):57-66, 2001. (Pubitemid 32936296)
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
6
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA ACM Press
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In ACM Conference on Computer and Communications Security, pages 148-160, New York, NY, USA, 2002. ACM Press.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
7
-
-
4344587804
-
Identification and authentication of integrated circuits: Research articles
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas. Identification and authentication of integrated circuits: Research articles. Concurr. Comput.: Pract. Exper., 16(11):1077-1098, 2004.
-
(2004)
Concurr. Comput.: Pract. Exper.
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
8
-
-
80051869122
-
-
November
-
Intrinsic ID. Intrinsic id - product page. http://www.intrinsic-id.com/ products/, November 2010.
-
(2010)
Intrinsic Id - Product Page
-
-
-
10
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication application. In Proceedings of the Symposium on VLSI Circuits, pages 176-159, 2004.
-
(2004)
Proceedings of the Symposium on VLSI Circuits
, pp. 176-159
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
11
-
-
77954733566
-
SBAP: Software-based attestation for peripherals
-
A. Acquisti, S. Smith, and A.-R. Sadeghi, editors chapter 2 Springer Berlin / Heidelberg, Berlin, Heidelberg
-
Y. Li, J. McCune, and A. Perrig. SBAP: Software-based attestation for peripherals. In A. Acquisti, S. Smith, and A.-R. Sadeghi, editors, Trust and Trustworthy Computing, volume 6101 of Lecture Notes in Computer Science, chapter 2, pages 16-29. Springer Berlin / Heidelberg, Berlin, Heidelberg, 2010.
-
(2010)
Trust and Trustworthy Computing, Volume 6101 of Lecture Notes in Computer Science
, pp. 16-29
-
-
Li, Y.1
Mccune, J.2
Perrig, A.3
-
12
-
-
24344446387
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
J. Nick L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium [25], pages 179-194.
-
Proceedings of the 13th USENIX Security Symposium [25]
, pp. 179-194
-
-
Nick, J.1
Petroni, L.2
Fraser, T.3
Molina, J.4
Arbaugh, W.A.5
-
14
-
-
0037144430
-
Physical one-way functions
-
R. S. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297:2026-2030, 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
15
-
-
77955180941
-
Bootstrapping trust in commodity computers
-
Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
B. Parno, J. M. McCune, and A. Perrig. Bootstrapping Trust in Commodity Computers. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 414-429, Oakland, CA, May 2010. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(2010)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 414-429
-
-
Parno, B.1
Mccune, J.M.2
Perrig, A.3
-
16
-
-
77950450649
-
SIMPL systems: On a public key variant of physical unclonable functions
-
U. Rührmair. SIMPL systems: On a public key variant of physical unclonable functions. Cryptology ePrint Archive, Report 2009/255, 2009.
-
(2009)
Cryptology EPrint Archive, Report 2009/255
-
-
Rührmair, U.1
-
17
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber. Modeling attacks on physical unclonable functions. In ACM CCS 2010, 2010.
-
(2010)
ACM CCS 2010
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
18
-
-
78650619858
-
PUF-enhanced RFID security and privacy
-
Cologne, Germany, April 26-27, 2010, April
-
A.-R. Sadeghi, C. Wachsmann, and I. Visconti. PUF-Enhanced RFID Security and Privacy. In 2nd Workshop on Secure Component and System Identification (SECSI 2010), Cologne, Germany, April 26-27, 2010, April 2010.
-
(2010)
2nd Workshop on Secure Component and System Identification (SECSI 2010)
-
-
Sadeghi, A.-R.1
Wachsmann, C.2
Visconti, I.3
-
19
-
-
34247361254
-
SCUBA: Secure Code Update by Attestation in sensor networks
-
DOI 10.1145/1161289.1161306, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless security, pages 85-94, New York, NY, USA, 2006. ACM. (Pubitemid 46634305)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
20
-
-
3042738543
-
SWATT: SoftWare-based ATTestation for embedded devices
-
Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla. SWATT: SoftWare-based ATTestation for embedded devices. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 272-, Oakland, CA, May 2004. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(2004)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 272
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
22
-
-
77952371831
-
-
Trusted Computing Group (TCG) Version 1.2, February
-
Trusted Computing Group (TCG). TPM Main Specification, Version 1.2, February 2005.
-
(2005)
TPM Main Specification
-
-
-
26
-
-
80051910904
-
-
November
-
Verayo, Inc. Verayo website - product page. http://www.verayo.com/ product/products.html, November 2010.
-
(2010)
Verayo Website - Product Page
-
-
-
27
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Washington, DC, USA IEEE Computer Society
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. In SRDS '07: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, pages 219-230, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SRDS '07: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
|