2008 |
23 | EE | Scott Garriss,
Ramón Cáceres,
Stefan Berger,
Reiner Sailer,
Leendert van Doorn,
Xiaolan Zhang:
Trustworthy and personalized computing on public kiosks.
MobiSys 2008: 199-210 |
22 | EE | Jason Franklin,
Mark Luk,
Jonathan M. McCune,
Arvind Seshadri,
Adrian Perrig,
Leendert van Doorn:
Towards Sound Detection of Virtual Machines.
Botnet Detection 2008: 89-116 |
2007 |
21 | EE | Leendert van Doorn:
Trusted computing challenges.
STC 2007: 1 |
2006 |
20 | EE | Leendert van Doorn:
Hardware virtualization trends.
VEE 2006: 45 |
19 | EE | Arvind Seshadri,
Mark Luk,
Adrian Perrig,
Leendert van Doorn,
Pradeep K. Khosla:
SCUBA: Secure Code Update By Attestation in sensor networks.
Workshop on Wireless Security 2006: 85-94 |
18 | EE | Arvind Seshadri,
Mark Luk,
Adrian Perrig,
Leendert van Doorn,
Pradeep K. Khosla:
Externally verifiable code execution.
Commun. ACM 49(9): 45-49 (2006) |
2005 |
17 | EE | Reiner Sailer,
Trent Jaeger,
Enriquillo Valdez,
Ramón Cáceres,
Ronald Perez,
Stefan Berger,
John Linwood Griffin,
Leendert van Doorn:
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
ACSAC 2005: 276-285 |
16 | EE | Elaine Shi,
Adrian Perrig,
Leendert van Doorn:
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
IEEE Symposium on Security and Privacy 2005: 154-168 |
15 | EE | Arvind Seshadri,
Mark Luk,
Elaine Shi,
Adrian Perrig,
Leendert van Doorn,
Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
SOSP 2005: 1-16 |
2004 |
14 | EE | Reiner Sailer,
Trent Jaeger,
Xiaolan Zhang,
Leendert van Doorn:
Attestation-based policy enforcement for remote access.
ACM Conference on Computer and Communications Security 2004: 308-317 |
13 | EE | James Hendricks,
Leendert van Doorn:
Secure bootstrap is not enough: shoring up the trusted computing base.
ACM SIGOPS European Workshop 2004: 11 |
12 | EE | Arvind Seshadri,
Adrian Perrig,
Leendert van Doorn,
Pradeep K. Khosla:
SWATT: SoftWare-based ATTestation for Embedded Devices.
IEEE Symposium on Security and Privacy 2004: 272- |
11 | EE | Reiner Sailer,
Xiaolan Zhang,
Trent Jaeger,
Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture.
USENIX Security Symposium 2004: 223-238 |
10 | EE | Todd W. Arnold,
Leendert van Doorn:
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer.
IBM Journal of Research and Development 48(3-4): 475-488 (2004) |
9 | EE | Joel W. Branch,
Nick L. Petroni Jr.,
Leendert van Doorn,
David Safford:
Autonomic 802.11 Wireless LAN Security Auditing.
IEEE Security & Privacy 2(3): 56-65 (2004) |
2002 |
8 | EE | Xiaolan Zhang,
Leendert van Doorn,
Trent Jaeger,
Ronald Perez,
Reiner Sailer:
Secure coprocessor-based intrusion detection.
ACM SIGOPS European Workshop 2002: 239-242 |
2001 |
7 | EE | William A. Arbaugh,
Leendert van Doorn:
Guest Editors' Introduction: Embedded Security: Challenges and Concerns.
IEEE Computer 34(10): 40-41 (2001) |
6 | EE | Joan G. Dyer,
Mark Lindemann,
Ronald Perez,
Reiner Sailer,
Leendert van Doorn,
Sean W. Smith,
Steve Weingart:
Building the IBM 4758 Secure Coprocessor.
IEEE Computer 34(10): 57-66 (2001) |
1999 |
5 | | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
Secure Internet Programming 1999: 395-412 |
1998 |
4 | | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet Security Incidents, a Survey within Dutch Organisations.
WebNet 1998 |
3 | EE | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations.
Computers & Security 17(5): 417-433 (1998) |
1996 |
2 | EE | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
IEEE Symposium on Security and Privacy 1996: 211-221 |
1994 |
1 | | Leendert van Doorn,
Andrew S. Tanenbaum:
Using Active Messages to Support Shared Objects.
ACM SIGOPS European Workshop 1994: 112-116 |