Jeffrey S. Dwoskin

According to our database1, Jeffrey S. Dwoskin authored at least 8 papers between 2005 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Key Management in Sensor Networks.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011

2010
A framework for testing hardware-software security architectures.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009

2008
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Re-examining Probabilistic Versus Deterministic Key Management.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Secure Key Management Architecture Against Sensor-Node Fabrication Attacks.
Proceedings of the Global Communications Conference, 2007

Hardware-rooted trust for secure key management and transient trust.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2005
Architecture for Protecting Critical Secrets in Microprocessors.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005


  Loading...