1 |
W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall,1998
|
2 |
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
|
3 |
Common Vulnerabilities and Exposures. (http://cve.mitre.org/)
|
4 |
D. Brumley and D. Boneh, "Remote Timing Attacks Are Practical ," in Proc. 12th USENIX Security Symp; pp. 1-14, Aug. 2003
|
5 |
A. Arbaugh, D. 1. Farber, and 1. M. Smith, "A Secure and Reliable BootStrap Architecture," in Proc. of IEEE Symposium on Security and Privacy, pp. 6571, May 1997
|
6 |
D. Lie, C. A. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proc. ACM Symposium on Operating Systems Principles, pp. 178-192, Oct. 2003
|
7 |
Next-Generation Secure Computing Base (NGSCB). Microsoft Inc. (http://www.microsoft.com/resources/ngscb/productinf o.mspx)
|
8 |
B. Yee, Using Secure Co-processors. PhD thesis, Carnegie Mellon University, 1994
|
9 |
Trusted Computing Group. (https:/www.trustedcomputinggroup.org/horne)
|
10 |
Discretix Technologies Ltd. (http://www.discretix.com)
|
11 |
G. C. Necula and P. Lee, "Proof-Carrying Code," Tech. Rep. MU-CS-96165,Carnegie Mellon University, Nov. 1996
|
12 |
G. Hoglund and G. McGraw, Exploiting Software: How to Break Code http://www.exploitingsoftware.com) , Addison- Wesley, 2004
|
13 |
Biometrics and Network Security. Prentice Hall PTR, 2003
|
14 |
S. Ravi, A. Raghunathan, and N. Potlapally, u Securing wireless data: System architecture challenges," in Proc. Inti. Symp. System Synthesis, pp. 195-200, October 2002
|
15 |
P. Kocher, J. Jaffe, and B. Jun, Introduction to differential power analysis and related attacks. (http://www.cryptography.com/resources/whitepapers/)
|
16 |
S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper Resistance Mechanisms for Secure Embedded Systems," in Proc. Int. Coni VLSI Design, Jan. 2004
|
17 |
OpenIPMP. http://www.openipmp.org
|
18 |
O. Kommerling and M. G. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. USENIX Workshop on Smartcard Technology (Smartcard '99),pp. 9-20, May 1999
|
19 |
D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults" , in Proc. of Eurocrypt'97, pp. 37-51, 1997
|
20 |
SSL 3.0 Specification. http://wp.netscape.com/eng/ssl31
|
21 |
IPSec Working Group. http://www.ietf.org/html.charters/ipsec - charter .html
|
22 |
S. Govindavajhala and A. W. Appel, "Using Memory Errors to Attack a Virtual Machine," in Proc. IEEE Symposium on Security and Privacy, pp. 154-165, May 2003
|
23 |
K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proc. Cryptographic Hardware and Embedded Systems, pp. 251-261, 2001
DOI
ScienceOn
|
24 |
Internet Streaming Media Alliance. httpi/www.isma.tv/horne
|
25 |
Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004
|