Proceedings of the 2nd Conference on Computing Frontiers 2005
DOI: 10.1145/1062261.1062308
|View full text |Cite
|
Sign up to set email alerts
|

A combined hardware and software architecture for secure computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…Many solutions have been proposed to improve the protection [5][6][7][8][9][10][11][12][13]. In general, they can be categorized into three types: technology, policy, and education.…”
Section: X-axis: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Many solutions have been proposed to improve the protection [5][6][7][8][9][10][11][12][13]. In general, they can be categorized into three types: technology, policy, and education.…”
Section: X-axis: Countermeasuresmentioning
confidence: 99%
“…Several researchers have studied the implementation of trustworthy systems [5][6][7][8][9][10][11][12][13]. However, we have observed that trustworthiness could not be achieved if there is no trusted integration of major network components.…”
Section: Introductionmentioning
confidence: 98%
“…The next paragraphs are providing a brief description of SAM's main attributes. A more detailed architectural description can be found in [2] and the design of the caches in [3].…”
Section: Sam Overviewmentioning
confidence: 99%
“…In this section, we first revisit the hashing scheme and data encryption proposed in [2,3], describing some weaknesses in security and performance. Then we propose some modifications on both the hashing and encryption schemes which improve the performance and strengthen the security.…”
Section: Hashing Scheme and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation