BibTeX records: Jeffrey S. Dwoskin

download as .bib file

@incollection{DBLP:series/eatcs/XuDHLLC11,
  author       = {Dahai Xu and
                  Jeffrey S. Dwoskin and
                  Jianwei Huang and
                  Tian Lan and
                  Ruby B. Lee and
                  Mung Chiang},
  editor       = {Sotiris E. Nikoletseas and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Key Management in Sensor Networks},
  booktitle    = {Theoretical Aspects of Distributed Computing in Sensor Networks},
  series       = {Monographs in Theoretical Computer Science. An {EATCS} Series},
  pages        = {741--785},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-14849-1\_23},
  doi          = {10.1007/978-3-642-14849-1\_23},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/eatcs/XuDHLLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DwoskinGCL10,
  author       = {Jeffrey S. Dwoskin and
                  Mahadevan Gomathisankaran and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A framework for testing hardware-software security architectures},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {387--397},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920318},
  doi          = {10.1145/1920261.1920318},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09,
  author       = {Timothy E. Levin and
                  Jeffrey S. Dwoskin and
                  Ganesha Bhaskara and
                  Thuy D. Nguyen and
                  Paul C. Clark and
                  Ruby B. Lee and
                  Cynthia E. Irvine and
                  Terry Benzel},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Securing the Dissemination of Emergency Response Data with an Integrated
                  Hardware-Software Architecture},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_9},
  doi          = {10.1007/978-3-642-00587-9\_9},
  timestamp    = {Sat, 28 Aug 2021 16:06:55 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/ChenGLSWBDP08,
  author       = {Xiaoxin Chen and
                  Tal Garfinkel and
                  E. Christopher Lewis and
                  Pratap Subrahmanyam and
                  Carl A. Waldspurger and
                  Dan Boneh and
                  Jeffrey S. Dwoskin and
                  Dan R. K. Ports},
  editor       = {Susan J. Eggers and
                  James R. Larus},
  title        = {Overshadow: a virtualization-based approach to retrofitting protection
                  in commodity operating systems},
  booktitle    = {Proceedings of the 13th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2008, Seattle, WA, USA, March 1-5, 2008},
  pages        = {2--13},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1346281.1346284},
  doi          = {10.1145/1346281.1346284},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/ChenGLSWBDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DwoskinL07,
  author       = {Jeffrey S. Dwoskin and
                  Ruby B. Lee},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Hardware-rooted trust for secure key management and transient trust},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315294},
  doi          = {10.1145/1315245.1315294},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DwoskinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DwoskinXHCL07,
  author       = {Jeffrey S. Dwoskin and
                  Dahai Xu and
                  Jianwei Huang and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {Secure Key Management Architecture Against Sensor-Node Fabrication
                  Attacks},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {166--171},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.39},
  doi          = {10.1109/GLOCOM.2007.39},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DwoskinXHCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/XuHDCL07,
  author       = {Dahai Xu and
                  Jianwei Huang and
                  Jeffrey S. Dwoskin and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {Re-examining Probabilistic Versus Deterministic Key Management},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {2586--2590},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557608},
  doi          = {10.1109/ISIT.2007.4557608},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/XuHDCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeKMDW05,
  author       = {Ruby B. Lee and
                  Peter C. S. Kwan and
                  John Patrick McGregor and
                  Jeffrey S. Dwoskin and
                  Zhenghong Wang},
  title        = {Architecture for Protecting Critical Secrets in Microprocessors},
  booktitle    = {32st International Symposium on Computer Architecture {(ISCA} 2005),
                  4-8 June 2005, Madison, Wisconsin, {USA}},
  pages        = {2--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCA.2005.14},
  doi          = {10.1109/ISCA.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeKMDW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}