Publications

Export (194) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
T
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
W
Lee, W., Ortiz, J., Ko, B., Lee, R.B., "Inferring Smartphone Users' Handwritten Patterns by Using Motion Sensors (Best Paper Award)", 4th Internation Conference on Information System Security and Privacy, Funchal, Madeira, Portugal, 22/01/2018. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R., "Quantification of De-anonymization Risks in Social Networks", Information Systems Security and Privacy, Porto, 19/02/2017. Abstract Tagged XML BibTex
Lee, W., Liu, X., Shen, Y., Jin, H., Lee, R., "Secure Pick Up: Implicit Authentication When You Start Using the Smartphone", ACM Symposium on Access Control Models and Technologies (SACMAT) , Indianapolis, 06/21/2017. Abstract Tagged XML BibTex
Lee, W., Lee, R., "Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning", IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, 06/26/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "Blind De-anonymization Attacks using Social Networks", Workshop on Privacy in the Electronic Society (WPES), Dallas, ACM, 30/10/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "How to Quantify Graph De-anonymization Risks", Springer Information Systems Security and Privacy: Springer, 2017  . Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Authentication for Smartphone Security", Information Systems Security and Privacy, vol. 576: Springer, pp. 160-176, 01/2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Sensor-based Authentication of Smartphone Users with Smartwatch", Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Multi-sensor authentication to improve smartphone security", Proceedings of International Conference on Information Systems Security and Privacy, February 2015. Abstract Tagged XML BibTex
Zhang, W., Szefer, J.M., Chen, Y., Yu, C., Li, W.X.Y., Cheung, R.C.C., Lee, R.B., "Design of Short Ring Oscillator-Based True Random Number Generator on FPGA Platform", Princeton University Department of Electrical Engineering Technical Report CE-L2011-006 (updated Dec. 8, 2011), Sept. 20, 2011. Tagged XML BibTex
Wang, Z., Lee, R.B., A Secure yet High Performance Cache Architecture, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-012, November 2007. Tagged XML BibTex
Wang, Z., Deng, J., Lee, R.B., "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC", IEEE Infocom 2007, pp. 2531-2535, May 6-12, 2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Cache Designs for Thwarting Software Cache-based Side Channel Attacks", Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), San Diego, CA, pp. 494 - 505, June 2007. Abstract Tagged XML BibTex
Wang, M., Lee, R.B., "Architecture for a Non-Copyable Disk (NCdisk) Using a Secret-Protection (SP) SoC Solution", Signals, Systems and Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on, Pacific Grove, CA, USA, pp. 1999-2003, 11/04/2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "Covert and Side Channels due to Processor Architecture", Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), pp. 473-482, December 2006. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation", Proceedings of the 8th Information Security Conference (ISC 2005), Singapore, pp. 498-505, September 2005. Tagged XML BibTex
Wang, Z., Lee, R.B., "Capacity Estimation of Non-Synchronous Covert Channels", Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS 2005), Columbus, OH, USA, pp. 170-176, June 6-9, 2005. Tagged XML BibTex
Wang, Z., Lee, R.B., "Micro-Architecture Issues of Predicated Execution", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA, pp. 349-354, Nov. 2003. Tagged XML BibTex
X
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J.S., Ports, D.R.K., "Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems", Proc. of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2008. Tagged XML BibTex
Xu, D., Huang, J., Dwoskin, J., Chiang, M., Lee, R.B., "Re-examining Probabilistic Versus Deterministic Key Management", Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT), Nice, France, pp. 2586-2590, June 2007. Abstract Tagged XML BibTex
Xiao Yang, R.L., "Adding 3D Graphics Support for PLX", Proceedings of the IEEE International Conference on Information Technology: Research and Education (ITRE 2003), Newark, New Jersey, USA, pp. 40-44, Aug. 2003. Tagged XML BibTex
Y
Shalabi, Y., Yan, M., Honarmand, N., Lee, R.B., Torrellas, J., "Record-Replay Architecture as a General Security Framework", IEEE International Symposium on High-Performance Computer Architecture (HPCA), Vienna, Austria, IEEE, 24/02/2018. Tagged XML BibTex
Yarom, Y., Ge, Q., Liu, F., Lee, R.B., Heiser, G., "Mapping the Intel Last-Level Cache", IACR Cryptology ePrint Archive, Report 2015/905, 2015  . Tagged XML BibTex



Papers are copyright by their authors, publishers, and/or Princeton University. Please see publishes' sites or contact the authors for full copyright policies.