-
1
-
-
84975126478
-
-
Trusted Computing Platform Aliance. TCPA main specification. http://www.trustedcomputing.org/.
-
TCPA Main Specification
-
-
-
4
-
-
85008038596
-
Improving the TCPA
-
August
-
William A. Arbaugh. Improving the TCPA. IEEE Computer, 35:77-79, August 2002.
-
(2002)
IEEE Computer
, vol.35
, pp. 77-79
-
-
Arbaugh, W.A.1
-
7
-
-
0002454352
-
Some efficient architecture simulation techniques
-
Berkeley, CA USENIX Association
-
R. Bedichek. Some efficient architecture simulation techniques. In Proceedings of the USENIX Winter 1990 Technical Conference, pages 53-64, Berkeley, CA, 1990. USENIX Association.
-
(1990)
Proceedings of the USENIX Winter 1990 Technical Conference
, pp. 53-64
-
-
Bedichek, R.1
-
8
-
-
0028288854
-
An attack on the interlock protocol when used for authentication
-
January
-
S. M. Bellovin and M. Merritt. An attack on the interlock protocol when used for authentication. IEEE Transactions on Information Theory, 40(1):273-275, January 1994.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 273-275
-
-
Bellovin, S.M.1
Merritt, M.2
-
10
-
-
0027204514
-
Towards uncheatable benchmarks
-
Jin-Yi Cai, Richard J. Lipton, Robert Sedgewick, and Andrew Chi-Chih Yao. Towards uncheatable benchmarks. In Structure in Complexity Theory Conference, pages 2-11, 1993.
-
(1993)
Structure in Complexity Theory Conference
, pp. 2-11
-
-
Cai, J.-Y.1
Lipton, R.J.2
Sedgewick, R.3
Yao, A.C.-C.4
-
11
-
-
0028533131
-
Bits: A smartcard protected operating system
-
November
-
Paul C. Clark and Lance J. Hoffman. Bits: A smartcard protected operating system. Communications of the ACM, 37(11):66-94, November 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 66-94
-
-
Clark, P.C.1
Hoffman, L.J.2
-
17
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean Smith, and Steve Weingart. Building the IBM 4758 secure coprocessor. IEEE Computer, 34(10):57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.6
Weingart, S.7
-
19
-
-
85077747018
-
-
Free Software Foundation. GNU GRUB. http://www.gnu.org/software/grub/grub.html, 2003.
-
(2003)
GNU GRUB
-
-
-
20
-
-
84937555419
-
Uncheatable distributed computations
-
Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In CT-RSA, pages 425-440, 2001.
-
(2001)
CT-RSA
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
21
-
-
0010902349
-
The protection of computer software: Its technology and applications
-
chapter Program Identification. Cambridge University Press, second edition
-
D. Grover. The protection of computer software: Its technology and applications. In The British Computer Society Monographs in Informatics, chapter Program Identification. Cambridge University Press, second edition, 1992.
-
(1992)
The British Computer Society Monographs in Informatics
-
-
Grover, D.1
-
23
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Fritz Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. Lecture Notes in Computer Science, 1419:92-113, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
26
-
-
84958776015
-
Personal secure booting
-
July
-
N. Itoi, W. A. Arbaugh, J. McHugh, and W. L. Fithen. Personal secure booting. In Proceedings of the Sixth Australian Conference on Information Security and Privacy, pages 130-144, July 2001.
-
(2001)
Proceedings of the Sixth Australian Conference on Information Security and Privacy
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
28
-
-
0003068282
-
Security architecture for the internet protocol
-
November
-
Steven Kent and Randall Atkinson. Security architecture for the internet protocol. IETF RFC 2401, November 1998.
-
(1998)
IETF RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
32
-
-
0036469676
-
Simics: A full system simulation platform
-
February
-
Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hallberg, Johan Högberg, Fredrik Larsson, Adreas Moestedt, and Bengt Werner. Simics: A full system simulation platform. IEEE Computer, 35(2):50-58, February 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.2
, pp. 50-58
-
-
Magnusson, P.S.1
Christensson, M.2
Eskilson, J.3
Forsgren, D.4
Hallberg, G.5
Högberg, J.6
Larsson, F.7
Moestedt, A.8
Werner, B.9
-
35
-
-
0141745451
-
-
fall keynote speech.
-
Paul Otellini. Intel developer forum, fall 2002, keynote speech. http://www.intel.com/pressroom/archive/speeches/otellini20020909.htm.
-
(2002)
Intel Developer Forum
-
-
Otellini, P.1
-
36
-
-
85077755152
-
-
Etherboot Project. Etherboot. http://www.etherboot.org/, 2003.
-
(2003)
Etherboot
-
-
-
39
-
-
84976825099
-
How to expose an eavesdropper
-
April
-
Ronald L. Rivest and Adi Shamir. How to expose an eavesdropper. Communications of the ACM, 27(4):393-395, April 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.4
, pp. 393-395
-
-
Rivest, R.L.1
Shamir, A.2
-
40
-
-
85084161596
-
Analysis of the intel pentium's ability to support a secure virtual machine monitor
-
USENIX Association
-
John Scott Robin and Cynthia E Irvine. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. In Proceedings of the 9th USENIX Security Symposium. USENIX Association, 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Robin, J.S.1
Irvine, C.E.2
-
41
-
-
12244250631
-
-
October
-
David Safford. The need for TCPA. http://www.research.ibm.com/gsal/tcpa/why-tcpa.pdf, October 2002.
-
(2002)
The Need for TCPA
-
-
Safford, D.1
-
42
-
-
0000432429
-
Design and implementation of the sun network filesystem
-
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon. Design and implementation of the Sun Network Filesystem. In Summer 1985 USENIX Conference, 1985.
-
(1985)
Summer 1985 USENIX Conference
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
-
44
-
-
84958045366
-
Using a high-performance, programmable secure coprocessor
-
Sean W Smith, Elaine R. Palmer, and Steve Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89,1998.
-
(1998)
Financial Cryptography
, pp. 73-89
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
-
45
-
-
84960561455
-
On computable numbers: With an application to the entscheidungs problem
-
A.M Turing. On computable numbers: With an application to the entscheidungs problem. Proceedings of the London Mathematical Society, 42:230-265, 1936.
-
(1936)
Proceedings of the London Mathematical Society
, vol.42
, pp. 230-265
-
-
Turing, A.M.1
-
46
-
-
85077734772
-
Design and implementation of signed executables for linux
-
College Park, June
-
L. van Doorn, G. Ballintijn, and W. A. Arbaugh. Design and implementation of signed executables for linux. Technical Report HPL-2001-227, University of Maryland, College Park, June 2001.
-
(2001)
Technical Report HPL-2001-227, University of Maryland
-
-
Van Doorn, L.1
Ballintijn, G.2
Arbaugh, W.A.3
-
47
-
-
0031274275
-
Software reliability via run-time result-checking
-
Hal Wasserman and Manuel Blum. Software reliability via run-time result-checking. Journal of the ACM, 44(6):826-849,1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.6
, pp. 826-849
-
-
Wasserman, H.1
Blum, M.2
-
50
-
-
0004196480
-
-
PhD thesis, Carnegie Mellon University, May
-
Bennet Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
|