default search action
Search dblp for Publications
export results for "toc:db/conf/middleware/systex2016.bht:"
@inproceedings{DBLP:conf/middleware/Atamli-ReinehBB16, author = {Ahmad Atamli{-}Reineh and Ravishankar Borgaonkar and Ranjbar A. Balisane and Giuseppe Petracca and Andrew P. Martin}, title = {Analysis of Trusted Execution Environment usage in Samsung {KNOX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007795}, doi = {10.1145/3007788.3007795}, timestamp = {Tue, 06 Nov 2018 16:57:13 +0100}, biburl = {https://dblp.org/rec/conf/middleware/Atamli-ReinehBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/BaumanL16, author = {Erick Bauman and Zhiqiang Lin}, title = {A Case for Protecting Computer Games With {SGX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007792}, doi = {10.1145/3007788.3007792}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/BaumanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/BrekaloSP16, author = {Helena Brekalo and Raoul Strackx and Frank Piessens}, title = {Mitigating Password Database Breaches with Intel {SGX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {1:1--1:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007789}, doi = {10.1145/3007788.3007789}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/BrekaloSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/KrawieckaPA16, author = {Klaudia Krawiecka and Andrew Paverd and N. Asokan}, title = {Protecting Password Databases using Trusted Hardware}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007798}, doi = {10.1145/3007788.3007798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/KrawieckaPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/KucukPMASA16, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and Andrew Paverd and Andrew Martin and N. Asokan and Andrew Simpson and Robin Ankele}, title = {Exploring the use of Intel {SGX} for Secure Many-Party Applications}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007793}, doi = {10.1145/3007788.3007793}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/KucukPMASA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/MilutinovicHWK16, author = {Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal}, title = {Proof of Luck: an Efficient Blockchain Consensus Protocol}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {2:1--2:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007790}, doi = {10.1145/3007788.3007790}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/MilutinovicHWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/RichterGM16, author = {Lars Richter and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller}, title = {Isolating Operating System Components with Intel {SGX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007796}, doi = {10.1145/3007788.3007796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/RichterGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/StrackxP16, author = {Raoul Strackx and Frank Piessens}, title = {Developing Secure {SGX} Enclaves: New Challenges on the Horizon}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {3:1--3:2}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007791}, doi = {10.1145/3007788.3007791}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/StrackxP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/VolpLDRRE16, author = {Marcus V{\"{o}}lp and Adam Lackorzynski and J{\'{e}}r{\'{e}}mie Decouchant and Vincent Rahli and Francisco Rocha and Paulo Jorge Esteves Ver{\'{\i}}ssimo}, title = {Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007794}, doi = {10.1145/3007788.3007794}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/VolpLDRRE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/middleware/2016systex, title = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788}, doi = {10.1145/3007788}, isbn = {978-1-4503-4670-2}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/2016systex.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.