Publications

Export (207) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
T
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
W
Lee, W., Ortiz, J., Ko, B., Lee, R.B., "Inferring Smartphone Users' Handwritten Patterns by Using Motion Sensors (Best Paper Award)", 4th Internation Conference on Information System Security and Privacy, Funchal, Madeira, Portugal, 22/01/2018. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R., "Quantification of De-anonymization Risks in Social Networks", Information Systems Security and Privacy, Porto, 19/02/2017. Abstract Tagged XML BibTex
Lee, W., Liu, X., Shen, Y., Jin, H., Lee, R., "Secure Pick Up: Implicit Authentication When You Start Using the Smartphone", ACM Symposium on Access Control Models and Technologies (SACMAT) , Indianapolis, 06/21/2017. Abstract Tagged XML BibTex
Lee, W., Lee, R., "Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning", IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, 06/26/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "Blind De-anonymization Attacks using Social Networks", Workshop on Privacy in the Electronic Society (WPES), Dallas, ACM, 30/10/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "How to Quantify Graph De-anonymization Risks", Springer Information Systems Security and Privacy: Springer, 2017  . Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Sensor-based Authentication of Smartphone Users with Smartwatch", Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Multi-sensor authentication to improve smartphone security", Proceedings of International Conference on Information Systems Security and Privacy, February 2015. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Authentication for Smartphone Security", Information Systems Security and Privacy, vol. 576: Springer, pp. 160-176, 2015  . Abstract Tagged XML BibTex
Zhang, W., Szefer, J.M., Chen, Y., Yu, C., Li, W.X.Y., Cheung, R.C.C., Lee, R.B., "Design of Short Ring Oscillator-Based True Random Number Generator on FPGA Platform", Princeton University Department of Electrical Engineering Technical Report CE-L2011-006 (updated Dec. 8, 2011), Sept. 20, 2011. Tagged XML BibTex
Wang, Z., Lee, R.B., A Secure yet High Performance Cache Architecture, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-012, November 2007. Tagged XML BibTex
Wang, Z., Deng, J., Lee, R.B., "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC", IEEE Infocom 2007, pp. 2531-2535, May 6-12, 2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Cache Designs for Thwarting Software Cache-based Side Channel Attacks", Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), San Diego, CA, pp. 494 - 505, June 2007. Abstract Tagged XML BibTex
Wang, M., Lee, R.B., "Architecture for a Non-Copyable Disk (NCdisk) Using a Secret-Protection (SP) SoC Solution", Signals, Systems and Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on, Pacific Grove, CA, USA, pp. 1999-2003, 11/04/2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "Covert and Side Channels due to Processor Architecture", Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), pp. 473-482, December 2006. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation", Proceedings of the 8th Information Security Conference (ISC 2005), Singapore, pp. 498-505, September 2005. Tagged XML BibTex



Papers are copyright by their authors, publishers, and/or Princeton University. Please see publishes' sites or contact the authors for full copyright policies.