An Analysis of the Intel 80×86 Security Architecture and Implementations
IEEE Transactions on Software Engineering
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
On the power of simple branch prediction analysis
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Trusted hardware: can it be trustworthy?
Proceedings of the 44th annual Design Automation Conference
Proceedings of the 44th annual Design Automation Conference
Yet another MicroArchitectural Attack:: exploiting I-Cache
Proceedings of the 2007 ACM workshop on Computer security architecture
A security architecture for transient trust
Proceedings of the 2nd ACM workshop on Computer security architectures
Predicting secret keys via branch prediction
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Hi-index | 0.00 |
Abstract: We present the design and implementation of a distributed service for performing sealed-bid auctions. This service provides an interface by which clients, or "bidders", can issue secret bids to the service for an advertised auction. Once the ...