What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jonathan M. McCune
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2013
conf/ccs
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Emmanuel Owusu
Jorge Guajardo
Jonathan M. McCune
James Newsome
Adrian Perrig
Amit Vasudevan
2013
conf/sp
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Amit Vasudevan
Sagar Chaki
Limin Jia
Jonathan M. McCune
James Newsome
Anupam Datta
2012
conf/ccs
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Amit Vasudevan
Jonathan M. McCune
James Newsome
Adrian Perrig
Leendert van Doorn
2012
conf/sp
Building Verifiable Trusted Path on Commodity x86 Computers.
Zongwei Zhou
Virgil D. Gligor
James Newsome
Jonathan M. McCune
2011
conf/ccs
VIPER: verifying the integrity of PERipherals' firmware.
Yanlin Li
Jonathan M. McCune
Adrian Perrig
2011
conf/sp
Memoir: Practical State Continuity for Protected Modules.
Bryan Parno
Jacob R. Lorch
John R. Douceur
James W. Mickens
Jonathan M. McCune
2011
conf/ndss
Usability Testing a Malware-Resistant Input Mechanism.
Alana Libonati
Jonathan M. McCune
Michael K. Reiter
2011
conf/dsn
Uni-directional trusted path: Transaction confirmation on just one device.
Atanas Filyanov
Jonathan M. McCune
Ahmad-Reza Sadeghi
Marcel Winandy
2010
conf/sp
Bootstrapping Trust in Commodity Computers.
Bryan Parno
Jonathan M. McCune
Adrian Perrig
2010
conf/sp
TrustVisor: Efficient TCB Reduction and Attestation.
Jonathan M. McCune
Yanlin Li
Ning Qu
Zongwei Zhou
Anupam Datta
Virgil D. Gligor
Adrian Perrig
2010
conf/ndss
Contractual Anonymity.
Edward J. Schwartz
David Brumley
Jonathan M. McCune
2009
conf/sp
CLAMP: Practical Prevention of Large-Scale Data Leaks.
Bryan Parno
Jonathan M. McCune
Dan Wendlandt
David G. Andersen
Adrian Perrig
2009
conf/ndss
Safe Passage for Passwords and Other Sensitive Data.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2007
conf/uss
Turtles All the Way Down: Research Challenges in User-Based Attestation.
Jonathan M. McCune
Adrian Perrig
Arvind Seshadri
Leendert van Doorn
2007
conf/sp
Minimal TCB Code Execution.
Jonathan M. McCune
Bryan Parno
Adrian Perrig
Michael K. Reiter
Arvind Seshadri
2006
conf/acsac
Shamon: A System for Distributed Mandatory Access Control.
Jonathan M. McCune
Trent Jaeger
Stefan Berger
Ramón Cáceres
Reiner Sailer
2005
conf/sp
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2005
conf/sp
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Jonathan M. McCune
Elaine Shi
Adrian Perrig
Michael K. Reiter
Coauthors
Adrian Perrig
(11)
Ahmad-Reza Sadeghi
(1)
Alana Libonati
(1)
Amit Vasudevan
(3)
Anupam Datta
(2)
Arvind Seshadri
(2)
Atanas Filyanov
(1)
Bryan Parno
(4)
Dan Wendlandt
(1)
David Brumley
(1)
David G. Andersen
(1)
Edward J. Schwartz
(1)
Elaine Shi
(1)
Emmanuel Owusu
(1)
Jacob R. Lorch
(1)
James Newsome
(4)
James W. Mickens
(1)
John R. Douceur
(1)
Jonathan M. McCune
(18)
Jorge Guajardo
(1)
Leendert van Doorn
(2)
Limin Jia
(1)
Marcel Winandy
(1)
Michael K. Reiter
(5)
Ning Qu
(1)
Ramón Cáceres
(1)
Reiner Sailer
(1)
Sagar Chaki
(1)
Stefan Berger
(1)
Trent Jaeger
(1)
Virgil D. Gligor
(2)
Yanlin Li
(2)
Zongwei Zhou
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to