Active Bibliography

320 Terra: a virtual machine-based platform for trusted computing – Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh - 2003
217 Architectural Support for Copy and Tamper Resistant Software – David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, Mark Horowitz - 2000
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
792 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
506 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
3 Reducing the Trusted Computing Base for Applications on Commodity Systems – Jonathan M. Mccune - 2009
516 I-TCP: Indirect TCP for mobile hosts – Ajay Bakre, B. R. Badrinath - 1995
615 Exokernel: An Operating System Architecture for Application-Level Resource Management – Dawson R. Engler, M. Frans Kaashoek, James O’toole - 1995
606 The x-Kernel: An Architecture for Implementing Network Protocols – Norman C. Hutchinson, Larry L. Peterson - 1991