Roger I. Khazan

Orcid: 0000-0002-6766-9169

Affiliations:
  • Massachusetts Institute of Technology, Cambridge, MA, USA


According to our database1, Roger I. Khazan authored at least 32 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TAG: Tagged Architecture Guide.
ACM Comput. Surv., 2023

Security-as-a-Service for Embedded Systems.
Proceedings of the IEEE Military Communications Conference, 2023

Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2023

2021
Practical Principle of Least Privilege for Secure Embedded Systems.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

2020
One Giant Leap for Computer Security.
IEEE Secur. Priv., 2020

Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
Guest Editorial: Special Issue on Hardware Solutions for Cyber Security.
J. Hardw. Syst. Secur., 2019

2018
Mission Assurance: Beyond Secure Processing.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Leveraging Intel SGX Technology to Protect Security-Sensitive Applications.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Functionality and Security Co-design Environment for Embedded Systems.
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018

2017
Towards a universal CDAR device: A high-performance adapter-based inline media encryptor.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Secure architecture for embedded systems.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

2013
SHAMROCK: self contained cryptography and key management processor.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
DSKE: Dynamic Set Key Encryption.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax.
RFC, June, 2011

A usable interface for location-based access control and Over-The-Air Keying in tactical environments.
Proceedings of the MILCOM 2011, 2011

Efficient transmission of DoD PKI certificates in tactical networks.
Proceedings of the MILCOM 2011, 2011

2010
ASE: Authenticated Statement Exchange.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

GROK: A Practical System for Securing Group Communications.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2007
Collusion-Resistant Group Key Management Using Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

2005
A Wide Area Network Simulation of Single-Round Group Membership Algorithms.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

2004
Group membership: a novel approach and the first single-round algorithm.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

2003
Detection of injected, dynamically generated, and obfuscated malicious code.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

2002
A one-round algorithm for virtually synchronous group communication in wide area networks.
PhD thesis, 2002

An inheritance-based technique for building simulation proofs incrementally.
ACM Trans. Softw. Eng. Methodol., 2002

A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach.
SIAM J. Comput., 2002

2000
A Client-Server Approach to Virtually Synchronous Group Multicast: Specifications and Algorithms.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1998
Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service.
Proceedings of the Distributed Computing, 12th International Symposium, 1998

1996
Parsing with Prefix and Suffix Dictionaries.
Proceedings of the 6th Data Compression Conference (DCC '96), Snowbird, Utah, USA, March 31, 1996


  Loading...