Multi-dimensional key generation of ICMetrics for cloud computing
暂无分享,去创建一个
W. Gareth J. Howells | Frank Wang | Bin Ye | Mustafa Haciosman | G. Howells | Frank Z. Wang | Bin Ye | Mustafa Haciosman
[1] Klaus D. Maier. On-chip debug support for embedded Systems-on-Chip , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[2] Miodrag Potkonjak,et al. Device aging-based physically unclonable functions , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Franck Cappello,et al. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009 , 2009, CCGRID.
[4] W. Gareth J. Howells,et al. Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[5] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[6] W. Gareth J. Howells,et al. Key Generation for Secure Inter-satellite Communication , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[7] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[8] Sencun Zhu,et al. Behavior based software theft detection , 2009, CCS.
[9] Victor Yu. Krachkovsky. Reed-Solomon codes for correcting phased error bursts , 2003, IEEE Trans. Inf. Theory.
[10] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[11] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[12] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[13] M. Desnoyers. LTTng: Tracing across execution layers, from the Hypervisor to user-space , 2008 .
[14] Klaus D. McDonald-Maier,et al. Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System , 2011 .
[15] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[17] Klaus D. McDonald-Maier,et al. An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption , 2012, 2012 Third International Conference on Emerging Security Technologies.
[18] Dongbing Gu,et al. Program Counter as an Integrated Circuit Metrics for Secured Program Identification , 2013, 2013 Fourth International Conference on Emerging Security Technologies.
[19] W. Gareth J. Howells,et al. Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.