default search action
Claire Vishik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Claire Vishik:
In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security. ASHES@CCS 2023: 1 - 2022
- [i2]Paras Bhatt, Claire Vishik, Govind Hariharan, H. Raghav Rao:
To Participate Or Not To Participate: An Investigation Of Strategic Participation In Standards. CoRR abs/2204.03055 (2022)
2010 – 2019
- 2019
- [c21]Marcello Balduccini, Edward R. Griffor, Michael Huth, Claire Vishik, David A. Wollman, Patrick Kamongi:
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making. MSCPES@CPSIoTWeek 2019: 1-6 - 2018
- [c20]Michael Huth, Claire Vishik, Riccardo Masucci:
Risk Engineering and Blockchain: Anticipating and Mitigating Risks. BIS (Workshops) 2018: 381-392 - [c19]Marcello Balduccini, Claire Vishik:
Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning. SSR 2018: 76-94 - [c18]Martin Burns, Edward R. Griffor, Marcello Balduccini, Claire Vishik, Michael Huth, David A. Wollman:
Reasoning about Smart City. SMARTCOMP 2018: 381-386 - [i1]Marcello Balduccini, Edward R. Griffor, Michael Huth, Claire Vishik, Martin Burns, David A. Wollman:
Ontology-Based Reasoning about the Trustworthiness of Cyber-Physical Systems. CoRR abs/1803.07438 (2018) - 2015
- [c17]David Ott, Claire Vishik, David Grawrock, Anand Rajan:
Trust Evidence for IoT: Trust Establishment from Servers to Sensors. ISSE 2015: 121-131 - [c16]Claire Vishik, Marcello Balduccini:
Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis. ISSE 2015: 135-145 - 2013
- [j3]Rajarshi Chakraborty, Claire Vishik, H. Raghav Rao:
Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing. Decis. Support Syst. 55(4): 948-956 (2013) - [c15]Claire Vishik, Frederick T. Sheldon, David Ott:
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment. ISSE 2013: 133-147 - 2012
- [j2]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu:
A practical device authentication scheme using SRAM PUFs. J. Cryptogr. Eng. 2(4): 255-269 (2012) - [c14]Claire Vishik, David Ott, David Grawrock:
Intention Semantics and Trust Evidence. ISSE 2012: 243-251 - [c13]Claire Vishik, Ruby B. Lee, Fred Chong:
Building Technologies that Help Cyber-Defense: Hardware-enabled Trust. ISSE 2012: 316-325 - 2011
- [c12]Claire Vishik, Anand Rajan, Chris Ramming, David Grawrock, Jesse Walker:
Defining trust evidence: research directions. CSIIRW 2011: 66 - [c11]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik:
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. INTRUST 2011: 271-288 - [c10]Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu:
A Practical Device Authentication Scheme Using SRAM PUFs. TRUST 2011: 63-77 - 2010
- [j1]Frederick T. Sheldon, Claire Vishik:
Moving Toward Trustworthy Systems: R&D Essentials. Computer 43(9): 31-40 (2010) - [c9]Timothy Casey, Patrick Koeberl, Claire Vishik:
Threat agents: a necessary component of threat analysis. CSIIRW 2010: 56 - [c8]Claire Vishik, Giusella Finocchiaro:
Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis. CSIIRW 2010: 80 - [c7]Timothy Casey, Patrick Koeberl, Claire Vishik:
Defining Threat Agents: Towards a More Complete Threat Analysis. ISSE 2010: 214-225 - [c6]Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik:
Silicon PUFs in Practice. ISSE 2010: 300-311
2000 – 2009
- 2009
- [c5]Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407 - [c4]Claire Vishik, Giusella Finocchiaro:
Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment. ISSE 2009: 197-205 - [c3]Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Claire Vishik:
Future of Assurance: Ensuring that a System is Trustworthy. ISSE 2009: 339-348 - 2007
- [c2]Claire Vishik, Simon Johnson, David Hoffman:
Infrastructure for Trusted Environment: In Search of a Solution. ISSE 2007: 219-227
1990 – 1999
- 1999
- [c1]Claire Vishik, Andrew B. Whinston:
Knowledge sharing, quality, and intermediation. WACC 1999: 157-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint