| dc.contributor.author | Athalye, Anish | |
| dc.contributor.author | Kaashoek, Frans | |
| dc.contributor.author | Zeldovich, Nickolai | |
| dc.contributor.author | Tassarotti, Joseph | |
| dc.date.accessioned | 2023-11-06T19:20:42Z | |
| dc.date.available | 2023-11-06T19:20:42Z | |
| dc.date.issued | 2023-10-23 | |
| dc.identifier.isbn | 979-8-4007-0411-6 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/152918 | |
| dc.publisher | ACM|Workshop on Kernel Isolation, Safety and Verification | en_US |
| dc.relation.isversionof | https://doi.org/10.1145/3625275.3625402 | en_US |
| dc.rights | Creative Commons Attribution | en_US |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | The K2 Architecture for Trustworthy Hardware Security Modules | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Athalye, Anish, Kaashoek, Frans, Zeldovich, Nickolai and Tassarotti, Joseph. 2023. "The K2 Architecture for Trustworthy Hardware Security Modules." | |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | |
| dc.identifier.mitlicense | PUBLISHER_CC | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2023-11-01T07:58:37Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2023-11-01T07:58:38Z | |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |