895 results on '"Virgil D"'
Search Results
2. Determining an Economic Value of High Assurance for Commodity Software Security.
3. An I/O Separation Model for Formal Verification of Kernel Implementations.
4. A Rest Stop on the Unending Road to Provable Security
5. Requirements for Root of Trust Establishment (Transcript of Discussion).
6. Assuring the Safety of Asymmetric Social Protocols.
7. The Case for In-Network Replay Suppression.
8. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents
9. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion)
10. Establishing Software Root of Trust Unconditionally.
11. A Rest Stop on the Unending Road to Provable Security
12. Anonymity Leakage in Private VoIP Networks.
13. k-Connectivity in Random K-Out Graphs Intersecting Erdős-Rényi Graphs.
14. PrivateRide: A Privacy-Enhanced Ride-Hailing Service.
15. On Connectivity and Robustness in Random Intersection Graphs.
16. Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
17. Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion).
18. Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme.
19. Optimal strategies for side-channel leakage in FCFS packet schedulers.
20. On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs.
21. Trusted Display on Untrusted Commodity Platforms.
22. Exact analysis of k-connectivity in secure sensor networks with unreliable links.
23. Establishing and Maintaining Root of Trust on Commodity Computer Systems.
24. Winning Against any Adversary on Commodity Computer Systems.
25. On Connectivity and Robustness in Random Intersection Graphs.
26. Hominin presence in Eurasia by at least 1.95 million years ago
27. Dancing with the Adversary: A Tale of Wimps and Giants.
28. Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O.
29. Connectivity in secure wireless sensor networks under transmission constraints.
30. On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels.
31. On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme.
32. Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
33. On the strengths of connectivity and robustness in general random intersection graphs.
34. CoDef: collaborative defense against large-scale link-flooding attacks.
35. Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
36. Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
37. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
38. ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.
39. ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion).
40. The Crossfire Attack.
41. Secure k-connectivity in wireless sensor networks under an on/off channel model.
42. STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
43. KISS: 'Key It Simple and Secure' Corporate Key Management.
44. Brief Encounters with a Random Key Graph : (Transcript of Discussion)
45. GeoPKI: Converting Spatial Trust into Certificate Trust.
46. Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion).
47. Street-Level Trust Semantics for Attribute Authentication.
48. Building Verifiable Trusted Path on Commodity x86 Computers.
49. Private communication detection: a stochastic approach.
50. Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.