-
1
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
July
-
Tiago Alves and Don Felton. Trustzone: Integrated hardware and software security. ARM white paper, July 2004.
-
(2004)
ARM White Paper
-
-
Alves, T.1
Felton, D.2
-
3
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC'09, pages 169-178, 2009.
-
(2009)
STOC'09
, pp. 169-178
-
-
Gentry, C.1
-
5
-
-
0023547498
-
Towards a theory of software protection and simulation on oblivious rams
-
O. Goldreich. Towards a theory of software protection and simulation on oblivious rams. In STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
6
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
7
-
-
52249100000
-
Cpu2006 working set size
-
March
-
Darryl Gove. Cpu2006 working set size. SIGARCH Comput. Archit. News, 35(1):90-96, March 2007.
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, Issue.1
, pp. 90-96
-
-
Gove, D.1
-
9
-
-
85076877909
-
Trinc: Small trusted hardware for large distributed systems
-
Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. Trinc: Small trusted hardware for large distributed systems. In NSDI, 2009.
-
(2009)
NSDI
-
-
Levin, D.1
Douceur, J.R.2
Lorch, J.R.3
Moscibroda, T.4
-
10
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pages 168-177, November 2000. (Pubitemid 32470896)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
11
-
-
82955198779
-
Efficient computation on oblivious rams
-
R. Ostrovsky. Efficient computation on oblivious rams. In STOC, 1990.
-
(1990)
STOC
-
-
Ostrovsky, R.1
-
12
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
November
-
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, and Srinivas Devadas. Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS. In Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06), November 2006.
-
(2006)
Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06)
-
-
Luis, F.1
Sarmenta, G.2
Van Dijk, M.3
O'Donnell, C.W.4
Rhodes, J.5
Devadas, S.6
-
15
-
-
85180805635
-
Towards practical oblivious ram
-
E. Stefanov, E. Shi, and D. Song. Towards practical oblivious ram. In NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
18
-
-
0004196480
-
-
PhD thesis, Carnegie Mellon University
-
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.S.1
|