Search dblp for Publications

export results for "toc:db/conf/middleware/systex2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/middleware/Atamli-ReinehBB16,
  author       = {Ahmad Atamli{-}Reineh and
                  Ravishankar Borgaonkar and
                  Ranjbar A. Balisane and
                  Giuseppe Petracca and
                  Andrew P. Martin},
  title        = {Analysis of Trusted Execution Environment usage in Samsung {KNOX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007795},
  doi          = {10.1145/3007788.3007795},
  timestamp    = {Tue, 06 Nov 2018 16:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/Atamli-ReinehBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/BaumanL16,
  author       = {Erick Bauman and
                  Zhiqiang Lin},
  title        = {A Case for Protecting Computer Games With {SGX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007792},
  doi          = {10.1145/3007788.3007792},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/BaumanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/BrekaloSP16,
  author       = {Helena Brekalo and
                  Raoul Strackx and
                  Frank Piessens},
  title        = {Mitigating Password Database Breaches with Intel {SGX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007789},
  doi          = {10.1145/3007788.3007789},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/BrekaloSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/KrawieckaPA16,
  author       = {Klaudia Krawiecka and
                  Andrew Paverd and
                  N. Asokan},
  title        = {Protecting Password Databases using Trusted Hardware},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007798},
  doi          = {10.1145/3007788.3007798},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/KrawieckaPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/KucukPMASA16,
  author       = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and
                  Andrew Paverd and
                  Andrew Martin and
                  N. Asokan and
                  Andrew Simpson and
                  Robin Ankele},
  title        = {Exploring the use of Intel {SGX} for Secure Many-Party Applications},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007793},
  doi          = {10.1145/3007788.3007793},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/KucukPMASA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/MilutinovicHWK16,
  author       = {Mitar Milutinovic and
                  Warren He and
                  Howard Wu and
                  Maxinder Kanwal},
  title        = {Proof of Luck: an Efficient Blockchain Consensus Protocol},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {2:1--2:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007790},
  doi          = {10.1145/3007788.3007790},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/MilutinovicHWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/RichterGM16,
  author       = {Lars Richter and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller},
  title        = {Isolating Operating System Components with Intel {SGX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007796},
  doi          = {10.1145/3007788.3007796},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/RichterGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/StrackxP16,
  author       = {Raoul Strackx and
                  Frank Piessens},
  title        = {Developing Secure {SGX} Enclaves: New Challenges on the Horizon},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {3:1--3:2},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007791},
  doi          = {10.1145/3007788.3007791},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/StrackxP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/VolpLDRRE16,
  author       = {Marcus V{\"{o}}lp and
                  Adam Lackorzynski and
                  J{\'{e}}r{\'{e}}mie Decouchant and
                  Vincent Rahli and
                  Francisco Rocha and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo},
  title        = {Avoiding Leakage and Synchronization Attacks through Enclave-Side
                  Preemption Control},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007794},
  doi          = {10.1145/3007788.3007794},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/VolpLDRRE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/middleware/2016systex,
  title        = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788},
  doi          = {10.1145/3007788},
  isbn         = {978-1-4503-4670-2},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/2016systex.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}