IA-CCF: Individual Accountability for Permissioned Ledgers | 0 | 0.34 | 2022 |
EnclaveDB: A Secure Database Using SGX | 16 | 0.56 | 2018 |
Simple, fast, and safe manual memory management. | 4 | 0.39 | 2017 |
The Pyramid Scheme: Oblivious RAM for Trusted Processors. | 1 | 0.35 | 2017 |
Managing Spacecraft Memory Buffers with Concurrent Data Collection and Downlink. | 0 | 0.34 | 2017 |
Strong And Efficient Cache Side-Channel Protection Using Hardware Transactional Memory | 12 | 0.48 | 2017 |
Project snowflake: non-blocking safe manual memory management in .NET | 3 | 0.39 | 2017 |
Oblivious Multi-Party Machine Learning On Trusted Processors | 39 | 1.02 | 2016 |
A design and verification methodology for secure isolated regions. | 24 | 0.72 | 2016 |
VC3: Trustworthy Data Analytics in the Cloud Using SGX | 161 | 4.25 | 2015 |
Observing and Preventing Leakage in MapReduce | 16 | 0.61 | 2015 |
Docovery: toward generic automatic document recovery | 4 | 0.40 | 2014 |
Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010 | 7 | 1.08 | 2010 |
Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009 | 5 | 0.82 | 2009 |
Fast byte-granularity software fault isolation | 78 | 2.49 | 2009 |
Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors | 105 | 2.75 | 2009 |
Preventing Memory Error Exploits with WIT | 128 | 5.06 | 2008 |
Vigilante: End-to-end containment of Internet worm epidemics | 19 | 1.31 | 2008 |
Bouncer: securing software by blocking bad input | 75 | 4.61 | 2007 |
Securing software by enforcing data-flow integrity | 127 | 5.59 | 2006 |
A first look at peer-to-peer worms: threats and defenses | 64 | 2.86 | 2005 |
Vigilante: end-to-end containment of internet worms | 261 | 25.38 | 2005 |
Debunking some myths about structured and unstructured overlays | 65 | 3.50 | 2005 |
Performance and dependability of structured peer-to-peer overlays | 89 | 6.47 | 2004 |
Should we build Gnutella on a structured overlay? | 61 | 3.72 | 2004 |
PIC: Practical Internet Coordinates for Distance Estimation | 184 | 10.02 | 2004 |
Mobile Augmented Reality for Environmental Management (MARE). | 0 | 0.34 | 2003 |
Efficient and flexible object sharing | 8 | 0.88 | 1996 |
Lightweight logging for lazy release consistent distributed shared memory | 33 | 1.89 | 1996 |