What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Leendert van Doorn
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2012
conf/ccs
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Amit Vasudevan
Jonathan M. McCune
James Newsome
Adrian Perrig
Leendert van Doorn
2007
conf/ccs
Trusted computing challenges.
Leendert van Doorn
2007
conf/uss
Turtles All the Way Down: Research Challenges in User-Based Attestation.
Jonathan M. McCune
Adrian Perrig
Arvind Seshadri
Leendert van Doorn
2006
conf/uss
vTPM: Virtualizing the Trusted Platform Module.
Stefan Berger
Ramón Cáceres
Kenneth A. Goldman
Ronald Perez
Reiner Sailer
Leendert van Doorn
2005
conf/sp
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Elaine Shi
Adrian Perrig
Leendert van Doorn
2005
conf/acsac
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Reiner Sailer
Trent Jaeger
Enriquillo Valdez
Ramón Cáceres
Ronald Perez
Stefan Berger
John Linwood Griffin
Leendert van Doorn
2004
conf/ccs
Attestation-based policy enforcement for remote access.
Reiner Sailer
Trent Jaeger
Xiaolan Zhang
Leendert van Doorn
2004
conf/uss
Design and Implementation of a TCG-based Integrity Measurement Architecture.
Reiner Sailer
Xiaolan Zhang
Trent Jaeger
Leendert van Doorn
2004
conf/sp
SWATT: SoftWare-based ATTestation for Embedded Devices.
Arvind Seshadri
Adrian Perrig
Leendert van Doorn
Pradeep K. Khosla
2000
conf/uss
A Secure Java Virtual Machine.
Leendert van Doorn
1998
journals/compsec
Internet security incidents, a survey within Dutch organizations.
Martin Caminada
Reind P. van de Riet
Arjen van Zanten
Leendert van Doorn
1996
conf/sp
Secure Network Objects.
Leendert van Doorn
Martín Abadi
Michael Burrows
Edward Wobber
Coauthors
Adrian Perrig
(4)
Amit Vasudevan
(1)
Arjen van Zanten
(1)
Arvind Seshadri
(2)
Edward Wobber
(1)
Elaine Shi
(1)
Enriquillo Valdez
(1)
James Newsome
(1)
John Linwood Griffin
(1)
Jonathan M. McCune
(2)
Kenneth A. Goldman
(1)
Leendert van Doorn
(12)
Martín Abadi
(1)
Martin Caminada
(1)
Michael Burrows
(1)
Pradeep K. Khosla
(1)
Ramón Cáceres
(2)
Reind P. van de Riet
(1)
Reiner Sailer
(4)
Ronald Perez
(2)
Stefan Berger
(2)
Trent Jaeger
(3)
Xiaolan Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to