-
7
-
-
48349100653
-
Loss and delay accountability for the internet
-
K. Argyraki, P. Maniatis, O. Irzak, S. Ashish, and S. Shenker. Loss and delay accountability for the internet. In IEEE International Conference on Network Protocols (ICNP), 2007.
-
IEEE International Conference on Network Protocols (ICNP), 2007
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
-
9
-
-
39149117709
-
ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens. ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans Inform. Syst. Secur, 2008.
-
(2008)
ACM Trans Inform. Syst. Secur
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
13
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
Springer-Verlag
-
M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In CRYPTO '95, pages 15-28. Springer-Verlag, 1995.
-
(1995)
CRYPTO '95
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
14
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication(PMAC)
-
EUROCRYPT '02, Springer-Verlag
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication(PMAC). In EUROCRYPT '02, volume LNCS 2322, pages 384-397. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2322
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
15
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Mckeown, and S. Shenker. Ethane: Taking control of the enterprise. In SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Mckeown, N.5
Shenker, S.6
-
16
-
-
44249126961
-
Sane: A protection architecture for enterprise networks
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. Mckeown, and S. Shenker. Sane: A protection architecture for enterprise networks. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
Mckeown, N.6
Shenker, S.7
-
17
-
-
3042666526
-
Modular verification of software components in C
-
S. Chaki, E. Clarke, A. Groce, S. Jha, and H. Veith. Modular verification of software components in C. In IEEE Transactions on Software Engineering, 2004.
-
(2004)
IEEE Transactions on Software Engineering
-
-
Chaki, S.1
Clarke, E.2
Groce, A.3
Jha, S.4
Veith, H.5
-
18
-
-
84958968987
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
Fast Software Encryption '01, Springer-Verlag
-
V. D. Gligor and P. Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In Fast Software Encryption '01, volume LNCS 2355, pages 92-108. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2355
, pp. 92-108
-
-
Gligor, V.D.1
Donescu, P.2
-
19
-
-
57349083089
-
Path-quality monitoring in the presence of adversaries
-
S. Goldberg, D. Xiao, E. Tromer, B. Barak, and J. Rexford. Path-quality monitoring in the presence of adversaries. In Proceedings of SIGMETRICS, 2008.
-
Proceedings of SIGMETRICS, 2008
-
-
Goldberg, S.1
Xiao, D.2
Tromer, E.3
Barak, B.4
Rexford, J.5
-
20
-
-
77952175956
-
A clean slate 4D approach to network control and management
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. In ACM SIGCOMM CCR, 2005.
-
(2005)
ACM SIGCOMM CCR
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
21
-
-
70749106620
-
-
T. C. Group. version 1.2
-
T. C. Group. TPM specification version 1.2, 2009.
-
(2009)
TPM Specification
-
-
-
26
-
-
64949133467
-
-
Israel Development Center, Israel Jan.
-
Intel Mobility Group, Israel Development Center, Israel. Intel advanced encryption standard (aes) instructions set, Jan. 2010. http://software.intel. com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/.
-
(2010)
Intel Advanced Encryption Standard (Aes) Instructions Set
-
-
-
27
-
-
0040291388
-
The Click modular router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 2000.
-
(2000)
ACM Transactions on Computer Systems
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
29
-
-
78149339728
-
Theory and new primitives for safely connecting routing protocol instances
-
F. Le, G. G. Xie, and H. Zhang. Theory and new primitives for safely connecting routing protocol instances. In ACM SIGCOMM, 2010.
-
(2010)
ACM SIGCOMM
-
-
Le, F.1
Xie, G.G.2
Zhang, H.3
-
31
-
-
70349687550
-
The research and efficient fpga implementation of ghash core for gmac
-
Y. Lu, G. Shou, Y. Hu, and Z. Guo. The research and efficient fpga implementation of ghash core for gmac. In International Conference on E-Business and Information System Security, pages 1-5, 2009.
-
(2009)
International Conference on E-Business and Information System Security
, pp. 1-5
-
-
Lu, Y.1
Shou, G.2
Hu, Y.3
Guo, Z.4
-
32
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2010
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
33
-
-
34548722186
-
Minimal TCB code execution
-
extended abstract
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. Minimal TCB code execution (extended abstract). In Proceedings of the IEEE Symposium on Security and Privacy, May 2007.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2007
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
37
-
-
77951609662
-
I am a sensor, and i approve this message
-
S. Saroiu and A. Wolman. I am a sensor, and i approve this message. In HotMobile, 2010.
-
(2010)
HotMobile
-
-
Saroiu, S.1
Wolman, A.2
-
38
-
-
67649866331
-
High-performance hardware architecture for galois counter mode
-
A. Satoh, T. Sugawara, and T. Aoki. High-performance hardware architecture for galois counter mode. IEEE Transactions on Computers, 58(7):917-930, 2009.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.7
, pp. 917-930
-
-
Satoh, A.1
Sugawara, T.2
Aoki, T.3
-
44
-
-
33749856204
-
A high-speed hardware architecture for universal message authentication code
-
DOI 10.1109/JSAC.2006.877133, 1705615
-
B. Yang, R. Karri, and D. A. McGrew. A high-speed hardware architecture for universal message authentication code. IEEE Journal on Selected Areas in Communications, 24(10):1831-1839, 2006. (Pubitemid 44559597)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1831-1839
-
-
Yang, B.1
Karri, R.2
McGrew, D.A.3
-
46
-
-
80051959854
-
SCION: Scalability, control, and isolation on next-generation networks
-
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. SCION: Scalability, control, and isolation on next-generation networks. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May 2011.
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May 2011
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
Chan, H.4
Perrig, A.5
Andersen, D.G.6
|