-
1
-
-
84955621400
-
Tamper resistant software: An implementation
-
Lecture Notes in Computer Science Cambridge, UK
-
D. Aucsmith. Tamper resistant software: an implementation. In Proc. International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1174, Cambridge, UK, 1996, pp. 317-333.
-
(1996)
Proc. International Workshop on Information Hiding
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
2
-
-
0026405370
-
Checking the correctness of memories
-
San Juan, Puerto Rico
-
M. Blum, W. Evans, P. Gemmel, S. Kannan, and M. Naor. Checking the correctness of memories. In Proc. IEEE Conf. on Foundations of Computer Science, San Juan, Puerto Rico, 1991, pp. 90-99.
-
(1991)
Proc. IEEE Conf. on Foundations of Computer Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmel, P.3
Kannan, S.4
Naor, M.5
-
3
-
-
85084161619
-
Heuristic cleaning algorithms in log-structured file systems
-
New Orleans, LA
-
T. Blackwell, J. Harris, and M. Seltzer. Heuristic cleaning algorithms in log-structured file systems. In Proc. USENIX Technical Conference, New Orleans, LA, 1995, pp. 249-264.
-
(1995)
Proc. USENIX Technical Conference
, pp. 249-264
-
-
Blackwell, T.1
Harris, J.2
Seltzer, M.3
-
4
-
-
0038223020
-
Forward integrity for secure audit logs
-
Computer Science and Engineering Department, University of California at San Diego
-
M. Bellare and B. Yee. Forward integrity for secure audit logs. Technical Report, Computer Science and Engineering Department, University of California at San Diego, 1997.
-
(1997)
Technical Report
-
-
Bellare, M.1
Yee, B.2
-
5
-
-
0027684663
-
Operating system protection through program evolution
-
Oxford
-
F. Cohen. Operating system protection through program evolution. In Computers & Security, 12(6), Oxford, 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.6
-
-
Cohen, F.1
-
7
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
San Diego, CA
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. ACM Principles of Programming Languages, San Diego, CA, 1998, pp. 184-196.
-
(1998)
Proc. ACM Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
84949189366
-
Secure distributed storage and retrieval
-
Berlin, Germany
-
J. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed storage and retrieval. In Proc. Intl. Workshop on Distributed Algorithms, Berlin, Germany, 1997, pp. 275-289.
-
(1997)
Proc. Intl. Workshop on Distributed Algorithms
, pp. 275-289
-
-
Garay, J.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
12
-
-
0009052794
-
Logical vs. Physical file backup
-
New Orleans, LA
-
N. Hutchinson, S. Manley, M. Federwisch, G. Harris, D. Hitz, S. Kleiman, S. O'Malley. Logical vs. physical file backup. In Proc. Symp. on Operating System Design and Implementation, New Orleans, LA, 1999, pp. 239-249.
-
(1999)
Proc. Symp. on Operating System Design and Implementation
, pp. 239-249
-
-
Hutchinson, N.1
Manley, S.2
Federwisch, M.3
Harris, G.4
Hitz, D.5
Kleiman, S.6
O'Malley, S.7
-
14
-
-
84883778394
-
-
August
-
Infineon Technologies. Eurochip II-SLE 5536, http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod-ov.jsp?oid=14702&cat-oid=-8233, August 2000.
-
(2000)
Eurochip II-SLE 5536
-
-
-
15
-
-
84860063023
-
-
August
-
InterTrust Technologies Corp. Digital rights management. http://www.intertrust.com/de/index.html, August 2000.
-
(2000)
Digital Rights Management
-
-
-
16
-
-
85029376135
-
-
August
-
IBM. Cryptolope technology, http://www.software.ibm.com/security/cryptolope, August 2000.
-
(2000)
Cryptolope Technology
-
-
-
17
-
-
0027882194
-
The logical disk: A new approach to improving file systems
-
Asheville, NC
-
W. Jonge, M. F. Kaashoek, W. Hsieh. The logical disk: a new approach to improving file systems. In Proc. ACM Symposium on Operating Systems Principles, Asheville, NC, 1993, pp. 15-28.
-
(1993)
Proc. ACM Symposium on Operating Systems Principles
, pp. 15-28
-
-
Jonge, W.1
Kaashoek, M.F.2
Hsieh, W.3
-
22
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
T. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2), 1989, pp. 335-348.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, T.1
-
24
-
-
0242613544
-
DigiBox: A self protecting container for information commerce
-
New York, NY
-
O. Sibert, D. Bernstein, and D. Van Wie. DigiBox: a self protecting container for information commerce. In Proc. USENIX Conference on Electronic Commerce, New York, NY, 1995, pp. 171-186.
-
(1995)
Proc. USENIX Conference on Electronic Commerce
, pp. 171-186
-
-
Sibert, O.1
Bernstein, D.2
Van Wie, D.3
-
25
-
-
85084161255
-
Cryptographic support for secure logs on untrusted machines
-
San Antonio, TX
-
B. Schneier and J. Kelsey. Cryptographic support for secure logs on untrusted machines. In Proc. USENIX Security Symposium, San Antonio, TX, 1998, pp. 52-62.
-
(1998)
Proc. USENIX Security Symposium
, pp. 52-62
-
-
Schneier, B.1
Kelsey, J.2
-
26
-
-
0038007750
-
Using a high-performance, programmable secure coprocessor
-
Anguilla, British West Indies
-
S. Smith, E. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Proc. Intl. Conf. on Financial Cryptography, Anguilla, British West Indies, 1998.
-
(1998)
Proc. Intl. Conf. on Financial Cryptography
-
-
Smith, S.1
Palmer, E.2
Weingart, S.3
-
27
-
-
85029390978
-
-
August
-
Wave Systems Corp. The Embassy e-commerce system. http://www.wave.com/technology/Embassywhitepaper.pdf, August 2000.
-
(2000)
The Embassy E-commerce System
-
-
-
28
-
-
85029360647
-
-
August
-
ContentGuard, Rights management from Xerox, http://www.contentguard.com, August 2000.
-
(2000)
Rights Management from Xerox
-
-
-
29
-
-
84947804767
-
-
Licentiate's thesis, Helsinki University of Technology
-
T. Ylonen. Shadow paging is feasible. Licentiate's thesis, Helsinki University of Technology, 1994.
-
(1994)
Shadow Paging is Feasible
-
-
Ylonen, T.1
|