AEGIS
Top Cited Papers
- 23 June 2003
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 160-171
- https://doi.org/10.1145/782814.782838
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology, 2003
- Silicon physical random functionsPublished by Association for Computing Machinery (ACM) ,2002
- Unlocking the design secrets of a 2.29 Gb/s Rijndael processorProceedings of the 39th conference on Design automation - DAC '02, 2002
- Architectural support for copy and tamper resistant softwarePublished by Association for Computing Machinery (ACM) ,2000
- SPEC CPU2000: measuring CPU performance in the New MillenniumComputer, 2000
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- JFlowPublished by Association for Computing Machinery (ACM) ,1999
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976