-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
1, Nov. DOI 10.1145/1609956.1609960
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information Systems Security, 13(1), Nov. 2009. DOI 10.1145/1609956.1609960.
-
(2009)
ACM Transactions on Information Systems Security
, vol.13
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
51949085080
-
A trusted mobile phone prototype
-
Jan. DOI 10.1109/ccnc08.2007.270
-
O. Aciicmez, A. Latifi, J.-P. Seifert, and X. Zhang. A trusted mobile phone prototype. In IEEE Consumer Communications and Networking Conference (CCNC), pages 1208-1209, Jan. 2008. DOI 10.1109/ccnc08.2007.270.
-
(2008)
IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 1208-1209
-
-
Aciicmez, O.1
Latifi, A.2
Seifert, J.-P.3
Zhang, X.4
-
3
-
-
78149481587
-
Remote health monitoring using mobile phones and web services
-
June DOI 10.1089/tmj.2009.0165
-
S. Agarwal and C. T. Lau. Remote health monitoring using mobile phones and web services. Telemedicine and e-Health, 16(5):603-607, June 2010. DOI 10.1089/tmj.2009.0165.
-
(2010)
Telemedicine and E-Health
, vol.16
, Issue.5
, pp. 603-607
-
-
Agarwal, S.1
Lau, T.C.2
-
4
-
-
0042853167
-
The role of actigraphy in the study of sleep and circadian rhythms
-
S. Ancoli-Israel, R. Cole, C. Alessi, M. Chambers, W. Moorcroft, and C. P. Pollak. The role of actigraphy in the study of sleep and circadian rhythms. American Academy of Sleep Medicine Review Paper, 26(3):342-392, 2003.
-
(2003)
American Academy of Sleep Medicine Review Paper
, vol.26
, Issue.3
, pp. 342-392
-
-
Ancoli-Israel, S.1
Cole, R.2
Alessi, C.3
Chambers, M.4
Moorcroft, W.5
Pollak, C.P.6
-
5
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
ACM, Nov. DOI 10.1145/2043556.2043574
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: a virtual mobile smartphone architecture. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pages 173-187. ACM, Nov. 2011. DOI 10.1145/2043556.2043574.
-
(2011)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
, pp. 173-187
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
6
-
-
77954416310
-
Context-aware smart home monitoring through pressure measurement sequences
-
Apr. DOI 10.1109/MEMEA.2010.5480223.
-
A. Arcelus, R. Goubran, H. Sveistrup, M. Bilodeau, and F. Knoefel. Context-aware smart home monitoring through pressure measurement sequences. In Proceedings of IEEE International Workshop on Medical Measurement and Applications (MEMEA), pages 32-37, Apr. 2010. DOI 10.1109/MEMEA.2010.5480223.
-
(2010)
Proceedings of IEEE International Workshop on Medical Measurement and Applications (MEMEA)
, pp. 32-37
-
-
Arcelus, A.1
Goubran, R.2
Sveistrup, H.3
Bilodeau, M.4
Knoefel, F.5
-
7
-
-
0028462563
-
Optimally profiling and tracing programs
-
July DOI
-
T. Ball and J. R. Larus. Optimally profiling and tracing programs. ACM Transactions on Programming Languages Systems, 16:1319-1360, July 1994. DOI http://doi.acm.org/10.1145/183432.183527.
-
(1994)
ACM Transactions on Programming Languages Systems
, vol.16
, pp. 1319-1360
-
-
Ball, T.1
Larus, J.R.2
-
8
-
-
79960189918
-
Smarter phones for healthier lifestyles: An adaptive fitness game
-
Oct. DOI 10.1109/MPRV.2010.52
-
F. Buttussi and L. Chittaro. Smarter phones for healthier lifestyles: An adaptive fitness game. IEEE Pervasive Computing, 9(4):51-57, Oct. 2010. DOI 10.1109/MPRV.2010.52.
-
(2010)
IEEE Pervasive Computing
, vol.9
, Issue.4
, pp. 51-57
-
-
Buttussi, F.1
Chittaro, L.2
-
10
-
-
78651583714
-
On-body chemical sensors for monitoring sweat
-
Wearable and Autonomous Biomedical Devices and Systems for Smart Environment, Springer, DOI 10.1007/978-3-642-15687-8 9
-
S. Coyle, F. Benito-Lopez, R. Byrne, and D. Diamond. On-body chemical sensors for monitoring sweat. In Wearable and Autonomous Biomedical Devices and Systems for Smart Environment, volume 75 of Lecture Notes in Electrical Engineering, pages 177-193. Springer, 2010. DOI 10.1007/978-3-642-15687-8 9.
-
(2010)
Lecture Notes in Electrical Engineering
, vol.75
, pp. 177-193
-
-
Coyle, S.1
Benito-Lopez, F.2
Byrne, R.3
Diamond, D.4
-
14
-
-
84864347884
-
-
Enterproid.com. Online at visited Dec. 2011
-
Enterproid.com. Enterproid: The Divide platform. Online at http://www.enterproid.com/features.php, visited Dec. 2011.
-
Enterproid: The Divide Platform
-
-
-
16
-
-
78651539599
-
XFI: Software guards for system address spaces
-
USENIX, Nov. Online at
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: software guards for system address spaces. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), pages 75-88. USENIX, Nov. 2006. Online at http://www.usenix.org/event/osdi06/tech/full-papers/erlingsson/ erlingsson.pdf.
-
(2006)
Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
17
-
-
84864354955
-
-
Giesecke and Devrient GmbH. Online at /, visited Mar. 2011
-
Giesecke and Devrient GmbH. Online at http://www.gi-de.com/, visited Mar. 2011.
-
-
-
-
18
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
T. Rabin, editor, Springer, DOI 10.1007/978-3-642-14623-7 25
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In T. Rabin, editor, Advances in Cryptology (CRYPTO), volume 6223, pages 465-482. Springer, 2010. DOI 10.1007/978-3-642-14623-7 25.
-
(2010)
Advances in Cryptology (CRYPTO)
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
19
-
-
77951556632
-
Toward trustworthy mobile sensing
-
ACM, Feb. DOI 10.1145/1734583.1734592
-
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall. Toward trustworthy mobile sensing. In Proceedings of the Workshop on Mobile Computing Systems & Applications (HotMobile), pages 31-36. ACM, Feb. 2010. DOI 10.1145/1734583. 1734592.
-
(2010)
Proceedings of the Workshop on Mobile Computing Systems & Applications (HotMobile)
, pp. 31-36
-
-
Gilbert, P.1
Cox, L.P.2
Jung, J.3
Wetherall, D.4
-
20
-
-
3042588361
-
Smart cards in hostile environments
-
Online at
-
H. Gobioff, S. Smith, J. D. Tygar, and B. Yee. Smart cards in hostile environments. In Proceedings of the USENIX Workshop on Electronic Commerce, pages 23-28, 1996. Online at http://www.cs.dartmouth.edu/~sws/pubs/gsty96.pdf.
-
(1996)
Proceedings of the USENIX Workshop on Electronic Commerce
, pp. 23-28
-
-
Gobioff, H.1
Smith, S.2
Tygar, J.D.3
Yee, B.4
-
21
-
-
84864347890
-
-
Online at visited Dec. 2011
-
Go-Trust NFC smart cards. Online at http://www.go-trust.com/products/swp- secure-microsd/, visited Dec. 2011.
-
Go-Trust NFC Smart Cards
-
-
-
22
-
-
84872066245
-
-
Online at /, visited Dec. 2011
-
Google. Google wallet. Online at http://www.google.com/wallet/, visited Dec. 2011.
-
Google Wallet
-
-
-
23
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
IEEE Press, May DOI 10.1109/SP.2008.31.
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pages 129-142. IEEE Press, May 2008. DOI 10.1109/SP.2008.31.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (S&P)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
25
-
-
84871243129
-
Next generation secure mobile devices
-
D. Kleidermacher. Next generation secure mobile devices. Information Quarterly, 7(4), 2008.
-
(2008)
Information Quarterly
, vol.7
, pp. 4
-
-
Kleidermacher, D.1
-
26
-
-
74049125186
-
A practical property-based bootstrap architecture
-
ACM, DOI 10.1145/1655108.1655114
-
R. Korthaus, A. R. Sadeghi, C. Stüble, and J. Zhan. A practical property-based bootstrap architecture. In Proceedings of the ACM Workshop on Scalable Trusted Computing (STC), pages 29-38. ACM, 2009. DOI 10.1145/1655108.1655114.
-
(2009)
Proceedings of the ACM Workshop on Scalable Trusted Computing (STC)
, pp. 29-38
-
-
Korthaus, R.1
Sadeghi, A.R.2
Stüble, C.3
Zhan, J.4
-
28
-
-
1242304439
-
Protecting Java code via code obfuscation
-
21-23, Apr. DOI 10.1145/332084.332092
-
D. Low. Protecting Java code via code obfuscation. Crossroads, 4(3):21-23, Apr. 1998. DOI 10.1145/332084.332092.
-
(1998)
Crossroads
, vol.4
, pp. 3
-
-
Low, D.1
-
29
-
-
80955131238
-
Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing
-
DOI 10.1145/2046556.2046574
-
S. Mare, J. Sorber, M. Shin, C. Cornelius, and D. Kotz. Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Oct. 2011. DOI 10.1145/2046556.2046574.
-
Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Oct. 2011
-
-
Mare, S.1
Sorber, J.2
Shin, M.3
Cornelius, C.4
Kotz, D.5
-
30
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
Apr. DOI 10.1145/1352592.1352625
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. SIGOPS Operating Systems Review, 42:315-328, Apr. 2008. DOI 10.1145/1352592.1352625.
-
(2008)
SIGOPS Operating Systems Review
, vol.42
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
31
-
-
84864363062
-
-
Online at visited Dec. 2010
-
Mobile Phone Work Group. Mobile Trusted Module FAQ. Online at http://www.trustedcomputinggroup.org/ resources/mobile-trusted-module-faq, visited Dec. 2010.
-
Mobile Trusted Module FAQ
-
-
-
33
-
-
34247264327
-
-
Web Site. Online at , visited Dec. 2011
-
SIMalliance. SIMaLliance Web Site. Online at http://www.simalliance.org, visited Dec. 2011.
-
SIMalliance
-
-
-
34
-
-
77951609662
-
I am a sensor, and I approve this message
-
ACM, DOI 10.1145/1734583.1734593
-
S. Saroiu and A. Wolman. I am a sensor, and I approve this message. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile), HotMobile '10, pages 37-42. ACM, 2010. DOI 10.1145/1734583.1734593.
-
(2010)
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile), HotMobile '10
, pp. 37-42
-
-
Saroiu, S.1
Wolman, A.2
-
35
-
-
78650692944
-
Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study
-
Dec. DOI 10.1161/CIRCULATIONAHA.110.960633
-
L. A. Saxon, D. L. Hayes, F. R. Gilliam, P. A. Heidenreich, J. Day, M. Seth, T. E. Meyer, P. W. Jones, and J. P. Boehmer. Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study. Circulation, 122(23):2359-2367, Dec. 2010. DOI 10.1161/CIRCULATIONAHA.110.960633.
-
(2010)
Circulation
, vol.122
, Issue.23
, pp. 2359-2367
-
-
Saxon, L.A.1
Hayes, D.L.2
Gilliam, F.R.3
Heidenreich, P.A.4
Day, J.5
Seth, M.6
Meyer, T.E.7
Jones, P.W.8
Boehmer, J.P.9
-
36
-
-
84864354988
-
-
Open source Online at visited Apr. 2011
-
Open source. Seek-for-android. Online at https: //code.google.com/p/seek- for-android/wiki/PCSCLite, visited Apr. 2011.
-
Seek-for-android
-
-
-
37
-
-
78650203267
-
The diversity of TPMs and its effects on development: A case study of integrating the TPM into OpenSolaris
-
ACM, DOI 10.1145/1867635.1867649.
-
A. Shubina, S. Bratus, W. Ingersol, and S. W. Smith. The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris. In Proceedings of the ACM Workshop on Scalable Trusted Computing (STC), pages 85-90. ACM, 2010. DOI 10.1145/1867635.1867649.
-
(2010)
Proceedings of the ACM Workshop on Scalable Trusted Computing (STC)
, pp. 85-90
-
-
Shubina, A.1
Bratus, S.2
Ingersol, W.3
Smith, S.W.4
-
38
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
L. Singaravelu, C. Pu, H. HÃd'rtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: Three case studies. In Proceedings of European Conference on Computer Systems, pages 161-174, 2006.
-
(2006)
Proceedings of European Conference on Computer Systems
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
HÃd'rtig, H.3
Helmuth, C.4
-
39
-
-
82655182920
-
Logical attestation: An authorization architecture for trustworthy computing
-
ACM, Nov. DOI 10.1145/2043556.2043580
-
E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pages 249-264. ACM, Nov. 2011. DOI 10.1145/2043556.2043580.
-
(2011)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
, pp. 249-264
-
-
Sirer, E.G.1
De Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.B.7
-
40
-
-
74249100886
-
Activity-aware ECG-based patient authentication for remote health monitoring
-
ACM Press, Nov. DOI 10.1145/1647314.1647378
-
J. Sriram, M. Shin, T. Choudhury, and D. Kotz. Activity-aware ECG-based patient authentication for remote health monitoring. In Proceedings of the International Conference on Multimodal Interfaces and Workshop on Machine Learning for Multi-modal Interaction (ICMI-MLMI), pages 297-304. ACM Press, Nov. 2009. DOI 10.1145/1647314.1647378.
-
(2009)
Proceedings of the International Conference on Multimodal Interfaces and Workshop on Machine Learning for Multi-modal Interaction (ICMI-MLMI)
, pp. 297-304
-
-
Sriram, J.1
Shin, M.2
Choudhury, T.3
Kotz, D.4
-
41
-
-
84864363045
-
-
Rev 103. Online at visited Dec. 2010
-
Trusted Computing Group. TPM Main Speci cation Level 2 Version 1.2, Rev 103. Online at http://www.trustedcomputinggroup.org/resources/tpm-main- specification, visited Dec. 2010.
-
TPM Main Speci Cation Level 2 Version 1.2
-
-
-
42
-
-
84980316005
-
-
web site. Online at visited Dec. 2010
-
TrustZone. ARM TrustZone web site. Online at http://www.arm.com/products/ processors/technologies/trustzone.php, visited Dec. 2010.
-
TrustZone
-
-
-
43
-
-
49949095440
-
Virtualization sparks security concerns
-
Aug. DOI 10.1109/MC.2008.276
-
S. Vaughan-Nichols. Virtualization sparks security concerns. Computer, 41(8):13-15, Aug. 2008. DOI 10.1109/MC.2008.276.
-
(2008)
Computer
, vol.41
, Issue.8
, pp. 13-15
-
-
Vaughan-Nichols, S.1
-
44
-
-
84864354966
-
-
VMWare, Inc. and LG Electronics MobileComm U.S.A, Inc. Dec. 7, Online at visited Dec. 2010
-
VMWare, Inc. and LG Electronics MobileComm U.S.A, Inc. VMWare News Release, Dec. 7, 2010. Online at http://www.vmware.com/company/news/releases/ vmware-lge-partnership.html, visited Dec. 2010.
-
(2010)
VMWare News Release
-
-
-
45
-
-
84864345737
-
Using trusted sensors to monitor patients' habits
-
USENIX Association, Aug. Online at
-
A. Wolman, S. Saroiu, and V. Bahl. Using trusted sensors to monitor patients' habits. In USENIX Workshop on Health Security and Privacy. USENIX Association, Aug. 2010. Online at http://research.microsoft.com/en-us/um/people/ alecw/healthsec-2010.pdf.
-
(2010)
USENIX Workshop on Health Security and Privacy
-
-
Wolman, A.1
Saroiu, S.2
Bahl, V.3
-
46
-
-
77955461661
-
Mobile personal health care system for patients with diabetes
-
Y. Lee, Z. Bien, M. Mokhtari, J. Kim, M. Park, J. Kim, H. Lee, and I. Khalil, editors, Aging Friendly Technology for Health and Independence, chapter 12, Springer, DOI 10.1007/978-3-642-13778-5-12.
-
F. Zhou, H.-I. Yang, J. Álamo, J. Wong, and C. Chang. Mobile personal health care system for patients with diabetes. In Y. Lee, Z. Bien, M. Mokhtari, J. Kim, M. Park, J. Kim, H. Lee, and I. Khalil, editors, Aging Friendly Technology for Health and Independence, volume 6159 of Lecture Notes in Computer Science, chapter 12, pages 94-101. Springer, 2010. DOI 10.1007/978-3-642-13778-5-12.
-
(2010)
Lecture Notes in Computer Science
, vol.6159
, pp. 94-101
-
-
Zhou, F.1
Yang, H.-I.2
Álamo, J.3
Wong, J.4
Chang, C.5
|