Levin, Timothy
621  Ergebnisse:
Personensuche X
?
1

Crafting a usable microkernel, processor, and I/O system wi..:

Tiwari, Mohit ; Oberg, Jason K. ; Li, Xun...
ACM SIGARCH Computer Architecture News.  39 (2011)  3 - p. 189-200 , 2011
 
?
2

Lessons Learned from Building a High-Assurance Crypto Gatew..:

Weissman, Clark ; Levin, Timothy
IEEE Security & Privacy Magazine.  9 (2011)  1 - p. 31-39 , 2011
 
?
3

Crafting a usable microkernel, processor, and I/O system wi..:

, In: Proceedings of the 38th annual international symposium on Computer architecture,
Tiwari, Mohit ; Oberg, Jason K. ; Li, Xun... - p. 189-200 , 2011
 
?
4

Crafting a usable microkernel, processor, and I/O system wi..:

, In: 2011 38th Annual International Symposium on Computer Architecture (ISCA),
Tiwari, Mohit ; Oberg, Jason K ; Li, Xun... - p. 189-199 , 2011
 
?
5

Security Primitives for Reconfigurable Hardware-Based Syste..:

Huffmire, Ted ; Levin, Timothy ; Nguyen, Thuy...
ACM Transactions on Reconfigurable Technology and Systems (TRETS).  3 (2010)  2 - p. 1-35 , 2010
 
?
6

Security Primitives for Reconfigurable Hardware-Based Syste..:

Huffmire, Ted ; Levin, Timothy ; Nguyen, Thuy...
ACM Transactions on Reconfigurable Technology and Systems.  3 (2010)  2 - p. 1-35 , 2010
 
?
7

Hardware trust implications of 3-D integration:

, In: Proceedings of the 5th Workshop on Embedded Systems Security,
Huffmire, Ted ; Levin, Timothy ; Bilzor, Michael... - p. 1-10 , 2010
 
?
8

Hardware assistance for trustworthy systems through 3-D int..:

, In: Proceedings of the 26th Annual Computer Security Applications Conference,
 
?
9

Managing Security in FPGA-Based Embedded Systems:

Huffmire, Ted ; Brotherton, Brett ; Sherwood, Timothy...
IEEE Design & Test of Computers.  25 (2008)  6 - p. 590-598 , 2008
 
?
12

Quality of security service:

, In: Proceedings of the 2000 workshop on New security paradigms,
Irvine, Cynthia ; Levin, Timothy - p. 91-99 , 2001
 
?
13

MYSEA : the monterey security architecture:

, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing,
 
?
14

A security domain model to assess software for exploitable ..:

, In: Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security,
 
?
15

A security architecture for transient trust:

, In: Proceedings of the 2nd ACM workshop on Computer security architectures,
 
1-15