Now showing items 1-3 of 1152

    • The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing 

      Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas (2003)
      We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the ...
    • Hybrid I/O Automata* 

      Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits (2003-01)
      Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose ...
    • Enhanced Certificate Revocation 

      Micali, Silvio (1996-03)
      We apply off-line/on-line signatures to provide an alternative solution to the problem of certificate revocation. The new systems dismiss with traditional CRLs (Certificate Revocation Lists) and yield public-key infrastructures ...