The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dwaine E. Clarke: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Controlled Physical Random Functions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:149-160 [Conf]
  2. Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh
    Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:188-207 [Conf]
  3. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Silicon physical random functions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:148-160 [Conf]
  4. Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Caches and Hash Trees for Efficient Memory Integrity. [Citation Graph (0, 0)][DBLP]
    HPCA, 2003, pp:295-306 [Conf]
  5. G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas
    AEGIS: architecture for tamper-evident and tamper-resistant processing. [Citation Graph (0, 0)][DBLP]
    ICS, 2003, pp:160-171 [Conf]
  6. Sameer Ajmani, Dwaine E. Clarke, Chuang-Hue Moh, Steven Richman
    ConChord: Cooperative SDSI Certificate Storage and Name Resolution. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:141-154 [Conf]
  7. G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas
    Efficient Memory Integrity Verification and Encryption for Secure Processors. [Citation Graph (0, 0)][DBLP]
    MICRO, 2003, pp:339-350 [Conf]
  8. Dwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest
    The Untrusted Computer Problem and Camera-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:114-124 [Conf]
  9. Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest
    Proxy-based security protocols in networked mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:265-272 [Conf]
  10. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Delay-Based Circuit Authentication and Applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:294-301 [Conf]
  11. Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest
    Access-Controlled Resource Discovery for Pervasive Networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:338-345 [Conf]
  12. Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas
    Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:139-153 [Conf]
  13. Blaise Gassend, Daihyun Lim, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Identification and authentication of integrated circuits. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1077-1098 [Journal]
  14. Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest
    Access-controlled resource discovery in pervasive networks. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1099-1120 [Journal]
  15. Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas
    Speeding up Exponentiation using an Untrusted Computational Resource. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:253-273 [Journal]
  16. Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest
    Certificate Chain Discovery in SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:4, pp:285-322 [Journal]

Search in 0.014secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002