-
2
-
-
35248835679
-
On memory-bound functions for fighting spam
-
Springer-Verlag
-
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In In Crypto, pages 426-444. Springer-Verlag, 2002.
-
(2002)
Crypto
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
3
-
-
34047170729
-
Software integrity protection using timed executable agents
-
New York, NY, USA, ACM
-
J. A. Garay and L. Huelsbergen. Software integrity protection using timed executable agents. In ASIACCS'06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 189-200, New York, NY, USA, 2006. ACM.
-
(2006)
ASIACCS'06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 189-200
-
-
Garay, J. A.1
Huelsbergen, L.2
-
4
-
-
85092092579
-
On the difficulty of validating voting machine software with software
-
Berkeley, CA, USA, USENIX Association
-
R. Gardner, S. Garera, and A. D. Rubin. On the difficulty of validating voting machine software with software. In EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, pages 11-11, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
, pp. 11-11
-
-
Gardner, R.1
Garera, S.2
Rubin, A. D.3
-
6
-
-
66249120727
-
Phone infections
-
S. Havlin. Phone infections. Science, 324(5930):1023-1024, 2009.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1023-1024
-
-
Havlin, S.1
-
10
-
-
77955034948
-
Conqueror: tamper-proof code execution on legacy systems
-
Springer, July Bonn, Germany. To appear
-
L. Martignoni, R. Paleari, and D. Bruschi. Conqueror: tamper-proof code execution on legacy systems. In Proceedings of the 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science. Springer, July 2010. Bonn, Germany. To appear.
-
(2010)
Proceedings of the 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science
-
-
Martignoni, L.1
Paleari, R.2
Bruschi, D.3
-
12
-
-
49049113110
-
Application-oriented trust in distributed computing
-
R. Scandariato, Y. Ofek, P. Falcarin, and M. Baldi. Application-oriented trust in distributed computing. In Third International Conference on Availability, Reliability and Security, 2008 (ARES 08), pages 434-439, 2008.
-
(2008)
Third International Conference on Availability, Reliability and Security, 2008 (ARES 08)
, pp. 434-439
-
-
Scandariato, R.1
Ofek, Y.2
Falcarin, P.3
Baldi, M.4
-
13
-
-
84885617227
-
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
-
New York, NY, USA, ACM Press
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP'05: Proceedings of the twentieth ACM symposium on Operating systems principles, pages 1-16, New York, NY, USA, 2005. ACM Press.
-
(2005)
SOSP'05: Proceedings of the twentieth ACM symposium on Operating systems principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
15
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim. Remote software-based attestation for wireless sensors. In ESAS, pages 27-41, 2005.
-
(2005)
ESAS
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
|