Applications and Challenges in Securing Time
暂无分享,去创建一个
[1] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[2] P.F. Swaszek,et al. An Evaluation of eLoran as a Backup to GPS , 2007, 2007 IEEE Conference on Technologies for Homeland Security.
[3] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[4] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[5] Christof Fetzer,et al. ShieldBox: Secure Middleboxes using Shielded Execution , 2018, SOSR.
[6] Todd E. Humphreys,et al. GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.
[7] Alec Wolman,et al. fTPM: A Software-Only Implementation of a TPM Chip , 2016, USENIX Security Symposium.
[8] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[9] Ratul Mahajan,et al. Timecard: controlling user-perceived delays in server-based mobile applications , 2013, SOSP.
[10] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[11] Amin Vahdat,et al. Exploiting a Natural Network Effect for Scalable, Fine-grained Clock Synchronization , 2018, NSDI.
[12] Bela Gipp,et al. Virtual Patent - Enabling the Traceability of Ideas Shared Online Using Decentralized Trusted Timestamping , 2017, ISI.
[13] Srdjan Capkun,et al. ROTE: Rollback Protection for Trusted Execution , 2017, USENIX Security Symposium.
[14] David Norton. Instrumenting a Data Center with InfluxDB , 2015 .
[15] Anshul Jaiswal,et al. Realtime Data Processing at Facebook , 2016, SIGMOD Conference.
[16] Sharon Goldberg,et al. The Security of NTP's Datagram Protocol , 2017, Financial Cryptography.