Publications

Export (207) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
S
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Champagne, D., Lee, R.B., "Scalable Architectural Support for Trusted Software", The 16th IEEE International Symposium on High-Performance Computer Architecture (HPCA), Bangalore, India, Jan 9-14 2010. Abstract Tagged XML BibTex
Champagne, D., "Scalable Security Architecture for Trusted Software", PhD Thesis, Electrical Engineering Department, Princeton, NJ, Princeton University, pp. 231, 2010  . Abstract Tagged XML BibTex
Dwoskin, J.S., "Securing the Use of Sensitive Data on Remote Devices Using a Hardware-Software Architecture", PhD Thesis, Electrical Engineering Department, Princeton, NJ, Princeton University, pp. 294, 2010  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Dwoskin, J.S., Gomathisankaran, M., Champagne, D., Lee, R.B., "SP Reference Manual Addendum -- Secure Stacks for TSMs and Emulation of SP Interrupt Protection", Princeton University Department of Electrical Engineering Technical Report CE-L2009-006, August 2009. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Dwoskin, J.S., Bhaskara, G., Nguyen, T.D., Lee, R.B., "SecureCore Prototype/Demo Manual", Princeton University Department of Electrical Engineering Technical Report CE-L2008-009, August 2008. Tagged XML BibTex
Dwoskin, J.S., Lee, R.B., "SP Processor Architecture Reference Manual", Princeton University Department of Electrical Engineering Technical Report CE-L2008-008, August 2008. Tagged XML BibTex
Chen, Y., Lee, R.B., "SP-PAX: Hardware implementation of SP module with PAX cryptoprocessor", Princeton University Department of Electrical Engineering Technical Report CE-L2008-006, April 2008. Tagged XML BibTex
Dwoskin, J., Xu, D., Huang, J., Chiang, M., Lee, R.B., "Secure Key Management Architecture Against Sensor-node Fabrication Attacks", IEEE GlobeCom 2007, Washington, DC, November 2007. Abstract Tagged XML BibTex
Dwoskin, J., Lee, R.B., SP Processor Architecture Reference Manual, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-009, 11/21/2007. Tagged XML BibTex
Champagne, D., Lee, R.B., "Scope of DDoS Countermeasures: Taxonomy of Proposed Solutions and Design Goals for Real-World Deployment", 8th International Symposium on Systems and Information Security (SSI'2006), November 2006. Abstract Tagged XML BibTex
Potlapally, N., Raghunathan, A., Ravi, S., Jha, N., Lee, R.B., "Satisfiability-based Framework for Enabling Side-channel Attacks on Cryptographic Software", Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2006), Munich, Germany, pp. 18-23, March 2006. Tagged XML BibTex
Lee, R.B., Yang, X., Shi, Z.J., "Single-Cycle Bit Permutations with MOMR Execution", Journal of Computer Science and Technology, vol. 20, issue 5, pp. 577-585, September 2005. Tagged XML BibTex
Kocher, P., Lee, R.B., McGraw, G., Raghunathan, A., Ravi, S., "Security as a New Dimension in Embedded System Design", Proceedings of the 41st Design Automation Conference (DAC 2004), San Diego, California, USA, pp. 753-760, June 2004. Tagged XML BibTex
Dwoskin, J., Basu, S., Talwar, V., Kumar, R., Kitson, F., Lee, R.B., "Scoping Security Issues for Interactive Grids", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA, pp. 367-373, Nov. 2003. Tagged XML BibTex
Shi, Z., Lee, R.B., "Subword Sorting with Versatile Permutation Instructions", Proceedings of the International Conference on Computer Design (ICCD 2002), Freiburg, Germany, pp. 234-241, Sept. 2002. Tagged XML BibTex
Ravi, S., Raghunathan, A., Potlapally, N., "Securing Wireless Data: System Architecture Challenges", Proceedings of the 15th IEEE International Symposium on System Synthesis (ISSS 2002), Kyoto, Japan, pp. 195-200, Oct. 2002. Tagged XML BibTex
Ravi, S., Raghunathan, A., Potlapally, N., Shankardass, M., "System Design Methodologies for a Wireless Security Processing Platform", Proceedings of the 39th ACM/IEEE Design Automation Conference (DAC 2002), New Orleans, Louisiana, USA, pp. 777-782, June 2002. Tagged XML BibTex
Lee, R.B., "Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures", Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2000), Boston, Massachusetts, USA, pp. 3-14, July 2000. Tagged XML BibTex
T
Szefer, J., Bau, J., Mitchell, J.C., Lee, R.B., "Trust but Verify: Trust Evidence for Hypervisor-Secure Virtualization", Princeton University Department of Electrical Engineering Technical Report CE-L2011-008, Nov. 16, 2011. Tagged XML BibTex
Ho, C.H., Luk, W., Szefer, J.M., Lee, R.B., "Tuning Instruction Customisation for Reconfigurable System-on-Chip", Proceedings of the 22nd IEEE International SOC Conference, Sept. 9-11, 2009. Abstract Tagged XML BibTex
Champagne, D., Elbaz, R., Lee, R.B., "The Reduced Address Space for Application Memory Authentication", Proceedings of the 11th Information Security Conference (ISC'08), September 2008. Tagged XML BibTex
Elbaz, R., Champagne, D., Lee, R.B., Torres, L., Sassatelli, G., Guillemin, P., "TEC-Tree: A Low Cost, Parallelizable Tree for Efficient Defense against Memory Replay Attacks", Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, pp. 289-302, September 2007. Abstract Tagged XML BibTex



Papers are copyright by their authors, publishers, and/or Princeton University. Please see publishes' sites or contact the authors for full copyright policies.