2008 |
11 | EE | Matthew Burnside,
Angelos D. Keromytis:
Asynchronous policy evaluation and enforcement.
CSAW 2008: 45-50 |
10 | EE | Matthew Burnside,
Angelos D. Keromytis:
Path-Based Access Control for Enterprise Networks.
ISC 2008: 191-203 |
9 | EE | Michael E. Locasto,
Matthew Burnside,
Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation.
IWSEC 2008: 136-151 |
8 | EE | Matthew Burnside,
Mack Lu,
Angelos D. Keromytis:
Authentication on Untrusted Remote Hosts with Public-Key Sudo.
LISA 2008: 103-107 |
2006 |
7 | EE | Matthew Burnside,
Angelos D. Keromytis:
Low Latency Anonymity with Mix Rings.
ISC 2006: 32-45 |
6 | EE | Angelos D. Keromytis,
Jason L. Wright,
Theo de Raadt,
Matthew Burnside:
Cryptography as an operating system service: A case study.
ACM Trans. Comput. Syst. 24(1): 1-38 (2006) |
2005 |
5 | EE | Matthew Burnside,
Angelos D. Keromytis:
The case for crypto protocol awareness inside the OS kernel.
SIGARCH Computer Architecture News 33(1): 58-64 (2005) |
2004 |
4 | EE | Sanjay Raman,
Dwaine E. Clarke,
Matt Burnside,
Srinivas Devadas,
Ronald L. Rivest:
Access-controlled resource discovery in pervasive networks.
Concurrency - Practice and Experience 16(11): 1099-1120 (2004) |
2003 |
3 | | Sanjay Raman,
Dwaine E. Clarke,
Matt Burnside,
Srinivas Devadas,
Ronald L. Rivest:
Access-Controlled Resource Discovery for Pervasive Networks.
SAC 2003: 338-345 |
2002 |
2 | EE | Dwaine E. Clarke,
Blaise Gassend,
Thomas Kotwal,
Matt Burnside,
Marten van Dijk,
Srinivas Devadas,
Ronald L. Rivest:
The Untrusted Computer Problem and Camera-Based Authentication.
Pervasive 2002: 114-124 |
1 | EE | Matt Burnside,
Dwaine E. Clarke,
Todd Mills,
Andrew Maywah,
Srinivas Devadas,
Ronald L. Rivest:
Proxy-based security protocols in networked mobile devices.
SAC 2002: 265-272 |