{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:46:28Z","timestamp":1730292388027,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/reldis.2004.1353020","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:02Z","timestamp":1103776442000},"page":"195-204","source":"Crossref","is-referenced-by-count":2,"title":["Hardware support for high performance, intrusion- and fault-tolerant systems"],"prefix":"10.1109","author":[{"given":"G.P.","family":"Saggese","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Basile","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Romano","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Z.","family":"Kalbarczyk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.K.","family":"Iyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","article-title":"An FPGA-based implementation of the RSA algorithm","author":"mazzeo","year":"2003","journal-title":"Proc of DATE"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601310"},{"key":"17","first-page":"207","article-title":"Practical threshold signatures","volume":"1807","author":"shoup","year":"2000","journal-title":"LNCS"},{"key":"36","first-page":"71","article-title":"An internet authorization scheme using smartcard-based security kernels","author":"deswarte","year":"2001","journal-title":"Proc of Int'l Conf on Research in Smart Cards (E-smart)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"journal-title":"I-care Project","year":"2003","key":"33"},{"journal-title":"Sun Crypto Accelerator 1000","year":"2003","key":"15"},{"journal-title":"HARP Project","year":"2003","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209926"},{"journal-title":"Motorola Mpc185","year":"2003","key":"14"},{"key":"37","first-page":"215","article-title":"Certificate-based access control for widely distributed resources","author":"thompson","year":"1999","journal-title":"Proc of USENIX Security Conference"},{"key":"11","article-title":"An internet attribute certificate profile for authorization","volume":"3281","author":"farrell","year":"2002","journal-title":"IETF RFC"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"21","article-title":"An intrusion- And fault-tolerant attribute authority using programmable hardware and software replication","author":"saggese","year":"2004","journal-title":"Technical Report UIUC"},{"journal-title":"OpenSSL project","year":"2003","key":"20"},{"key":"22","article-title":"Cryptography on FPGAs: State of the art implementations and attacks","author":"wollinger","year":"2003","journal-title":"ACM Trans on Embedded Computing Systems"},{"key":"23","article-title":"Configuration issues: Power-up, volatility, security, battery back-up","volume":"xapp 92","author":"xilinx","year":"1997","journal-title":"Application Note"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020748"},{"key":"25","article-title":"An FPGA-based key-store for improving the dependability of security services","author":"mazzeo","year":"2003","journal-title":"Tech Rep"},{"key":"26","article-title":"Transparent run-time defense against stack smashing attacks","author":"baratloo","year":"2000","journal-title":"Proc of USENIX Annual Technical Conference"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"journal-title":"CERT Advisories","year":"2003","key":"28"},{"journal-title":"The ensemble system","year":"1997","author":"hayden","key":"29"},{"journal-title":"MAFTIA Project","year":"2003","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"10","article-title":"Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile","volume":"3280","author":"housley","year":"2002","journal-title":"IETF RFC"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130780"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028897"},{"key":"7","article-title":"Design principles for tamper-resistant smartcard processors","author":"kommerling","year":"1999","journal-title":"Proc USENIX Workshop on Smartcard Technology"},{"key":"6","article-title":"Intrusion-tolerant authorization scheme for internet applications","author":"deswarte","year":"2002","journal-title":"Proc of DSN"},{"journal-title":"SDSI-SPKI Project","year":"2003","key":"32"},{"key":"5","article-title":"Playing hide and seek with stored keys","volume":"1648","author":"shamir","year":"1999","journal-title":"LNCS"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/RELDI.2000.885404"},{"key":"4","article-title":"Intrusion tolerance approaches in itua","author":"cukier","year":"2001","journal-title":"Supp of DSN"},{"journal-title":"Internet X 509 Public Key Infrastructure Roadmap","year":"2002","author":"arsenault","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"}],"event":{"name":"Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.","start":{"date-parts":[[2004,10,18]]},"location":"Florianpolis, Brazil","end":{"date-parts":[[2004,10,20]]}},"container-title":["Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9361\/29724\/01353020.pdf?arnumber=1353020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T12:30:36Z","timestamp":1489494636000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1353020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/reldis.2004.1353020","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}