A Rest Stop on the Unending Road to Provable Security

[1]  Virgil D. Gligor,et al.  Establishing Software Root of Trust Unconditionally , 2019, NDSS.

[2]  Virgil D. Gligor,et al.  Requirements for Root of Trust Establishment , 2018, Security Protocols Workshop.

[3]  Paul C. van Oorschot,et al.  Science of Security: Combining Theory and Measurement to Reflect the Observable , 2018, IEEE Security & Privacy.

[4]  Miguel Herrero-Collantes,et al.  Quantum random number generators , 2016, 1604.03304.

[5]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[6]  Adrian Perrig,et al.  VIPER: verifying the integrity of PERipherals' firmware , 2011, CCS '11.

[7]  Adrian Perrig,et al.  Bootstrapping Trust in Modern Computers , 2011, Springer Briefs in Computer Science.

[8]  Virgil D. Gligor Security Limitations of Virtualization and How to Overcome Them , 2010, Security Protocols Workshop.

[9]  Stefano Pironio,et al.  Random numbers certified by Bell’s theorem , 2009, Nature.

[10]  Butler W. Lampson Privacy and securityUsable security , 2009, Commun. ACM.

[11]  Ivan Damgård,et al.  A "proof-reading" of Some Issues in Cryptography , 2007, ICALP.

[12]  Virgil D. Gligor On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) , 2005, Security Protocols Workshop.

[13]  Peter Bro Miltersen Lower Bounds for Static Dictionaries on RAMs with Bit Operations But No Multiplication , 1996, ICALP.

[14]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.