CISR

Results: 347



#Item
71Hardware Trust Implications of 3-D Integration Ted Huffmire, Timothy Levin, Michael Bilzor, and Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA 93943

Hardware Trust Implications of 3-D Integration Ted Huffmire, Timothy Levin, Michael Bilzor, and Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA 93943

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2010-11-15 16:22:59
    72Microsoft Word - Nguyen-CV-Mar09-v2.doc

    Microsoft Word - Nguyen-CV-Mar09-v2.doc

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2009-03-16 17:43:20
      73Microsoft Word - NPS-CS-06_012_DISTPG.doc

      Microsoft Word - NPS-CS-06_012_DISTPG.doc

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:47
        74NPS-CSAugust 2006 | SecureCore Technical Report Trustworthy Commodity Computation and Communication

        NPS-CSAugust 2006 | SecureCore Technical Report Trustworthy Commodity Computation and Communication

        Add to Reading List

        Source URL: www.cisr.us

        Language: English - Date: 2007-11-15 12:21:46
          75Engineering Secure Systems  Lessons Learned from Building a High-Assurance Crypto Gateway  The construction of a complex secure system composed

          Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

          Add to Reading List

          Source URL: cisr.nps.edu

          Language: English - Date: 2012-10-30 13:53:03
            76NPS-CSMay 2002 | white paper The Center for INFOSEC Studies and Research

            NPS-CSMay 2002 | white paper The Center for INFOSEC Studies and Research

            Add to Reading List

            Source URL: www.cisr.us

            Language: English - Date: 2007-11-15 12:21:44
              77Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture Timothy E. Levin1 , Jeffrey S. Dwoskin2 , Ganesha Bhaskara3 Thuy D. Nguyen1 , Paul C. Clark1 , Ruby B. Lee2 Cynthia

              Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture Timothy E. Levin1 , Jeffrey S. Dwoskin2 , Ganesha Bhaskara3 Thuy D. Nguyen1 , Paul C. Clark1 , Ruby B. Lee2 Cynthia

              Add to Reading List

              Source URL: cisr.nps.edu

              Language: English - Date: 2009-06-04 09:26:02
                78Microsoft Word - OOPSLA_DSM07_Paper_v14.doc

                Microsoft Word - OOPSLA_DSM07_Paper_v14.doc

                Add to Reading List

                Source URL: cisr.nps.edu

                Language: English - Date: 2007-11-15 12:21:17
                79Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School  Abstract—To counter the growing threat of malicious sub

                Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub

                Add to Reading List

                Source URL: cisr.nps.edu

                Language: English - Date: 2012-10-30 13:43:14
                  80About NPS CS  Enhance your Cyber Security Knowledge FUNDAMENTALS: Create a strong foundational

                  About NPS CS Enhance your Cyber Security Knowledge FUNDAMENTALS: Create a strong foundational

                  Add to Reading List

                  Source URL: www.cisr.us

                  Language: English - Date: 2010-10-29 16:34:18