default search action
BibTeX records: Jeffrey S. Dwoskin
@incollection{DBLP:series/eatcs/XuDHLLC11, author = {Dahai Xu and Jeffrey S. Dwoskin and Jianwei Huang and Tian Lan and Ruby B. Lee and Mung Chiang}, editor = {Sotiris E. Nikoletseas and Jos{\'{e}} D. P. Rolim}, title = {Key Management in Sensor Networks}, booktitle = {Theoretical Aspects of Distributed Computing in Sensor Networks}, series = {Monographs in Theoretical Computer Science. An {EATCS} Series}, pages = {741--785}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-14849-1\_23}, doi = {10.1007/978-3-642-14849-1\_23}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/eatcs/XuDHLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DwoskinGCL10, author = {Jeffrey S. Dwoskin and Mahadevan Gomathisankaran and Yu{-}Yuan Chen and Ruby B. Lee}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A framework for testing hardware-software security architectures}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {387--397}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920318}, doi = {10.1145/1920261.1920318}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09, author = {Timothy E. Levin and Jeffrey S. Dwoskin and Ganesha Bhaskara and Thuy D. Nguyen and Paul C. Clark and Ruby B. Lee and Cynthia E. Irvine and Terry Benzel}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {133--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_9}, doi = {10.1007/978-3-642-00587-9\_9}, timestamp = {Sat, 28 Aug 2021 16:06:55 +0200}, biburl = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/ChenGLSWBDP08, author = {Xiaoxin Chen and Tal Garfinkel and E. Christopher Lewis and Pratap Subrahmanyam and Carl A. Waldspurger and Dan Boneh and Jeffrey S. Dwoskin and Dan R. K. Ports}, editor = {Susan J. Eggers and James R. Larus}, title = {Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems}, booktitle = {Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2008, Seattle, WA, USA, March 1-5, 2008}, pages = {2--13}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1346281.1346284}, doi = {10.1145/1346281.1346284}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/ChenGLSWBDP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DwoskinL07, author = {Jeffrey S. Dwoskin and Ruby B. Lee}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Hardware-rooted trust for secure key management and transient trust}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {389--400}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315294}, doi = {10.1145/1315245.1315294}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DwoskinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DwoskinXHCL07, author = {Jeffrey S. Dwoskin and Dahai Xu and Jianwei Huang and Mung Chiang and Ruby B. Lee}, title = {Secure Key Management Architecture Against Sensor-Node Fabrication Attacks}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {166--171}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.39}, doi = {10.1109/GLOCOM.2007.39}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DwoskinXHCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/XuHDCL07, author = {Dahai Xu and Jianwei Huang and Jeffrey S. Dwoskin and Mung Chiang and Ruby B. Lee}, title = {Re-examining Probabilistic Versus Deterministic Key Management}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {2586--2590}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557608}, doi = {10.1109/ISIT.2007.4557608}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/XuHDCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeKMDW05, author = {Ruby B. Lee and Peter C. S. Kwan and John Patrick McGregor and Jeffrey S. Dwoskin and Zhenghong Wang}, title = {Architecture for Protecting Critical Secrets in Microprocessors}, booktitle = {32st International Symposium on Computer Architecture {(ISCA} 2005), 4-8 June 2005, Madison, Wisconsin, {USA}}, pages = {2--13}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISCA.2005.14}, doi = {10.1109/ISCA.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeKMDW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.