Implementing an untrusted operating system on trusted hardware release_c5zxrjih45alrpdg6r6eurn2hq

by David Lie, Chandramohan A. Thekkath, Mark Horowitz

Released as a paper-conference by ACM Press.

(2003)

Archived Files and Locations

application/pdf  187.4 kB
file_ny4syjxlibbxfd37snce3enloi
web.archive.org (webarchive)
www.eecg.toronto.edu (web)
www.eecg.utoronto.ca (web)
www.eecg.toronto.edu:80 (web)
web.archive.org (webarchive)
+ 25 more URLs
application/pdf  252.7 kB
file_eseotkg4arhq7csmyqd2c7tsya
web.archive.org (webarchive)
www.cs.cornell.edu (web)
application/pdf  229.4 kB
file_ol2i5lsurfgj3iyvl5ytuk6nei
thekkath.org (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
www.cs.princeton.edu (web)
+ 13 more URLs
application/pdf  280.9 kB
file_lrbktul5uvfvvi2wruvmsj6sw4
web.archive.org (webarchive)
www.ittc.ku.edu (web)
web.archive.org (webarchive)
Read Archived PDF
Archived
Type  paper-conference
Stage   unknown
Year   2003
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: a6786f05-60fd-4e09-b5e7-9be2f525af26
API URL: JSON