A Survey of Anti-Tamper Technologies
Blasch-Net-Centric Layered Sensing (ISIF08panel)
DNA Crypto Csit2115
Cybenko - Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity_The QuERIES Methodology
Goh - SiRiUS_Securing Remote Untrusted Storage
Geron - Cryptographic Remote Untrusted Storage Without Public Keys
Bryant-Layered Sensing, Definition, Attributes, Guiding Principles (AFD-080820-005)
Ashleigh-Trust and Technologies
Bellissimo - Secure Software Updates_Disappointments and New Challenges
Georgiev - A Security Model for Distributed Computing
Martignoni - Cloud Terminal_Secure Access to Sensitive Applications From Untrusted Systems
Zeldovich - Securing Distributed Systems With Information Flow Control
Zeldovich - Securing Untrustworthy Software Using Information Flow Control (Dissertation)
Haldar - Towards Trusted Systems From the Ground Up
Hofmann - Secure Applications on an Untrusted Operating System
Huffmire - Managing Security in FPGA-Based Embedded Systems
Password Recovery Speeds
Csw06 Byres
Heiser - Road to Trustworthy Systems
Cook - Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware