David Durham

Orcid: 0009-0003-0069-3177

According to our database1, David Durham authored at least 27 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptographic Memory Tagging: Towards Stateless Integrity.
Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, 2024

Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2021
Cryptographic Capability Computing.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

2020
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher.
IACR Cryptol. ePrint Arch., 2020

The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction.
IACR Cryptol. ePrint Arch., 2020

Security definitions, entropy measures and constructions for implicitly detecting data corruption.
Comput. Commun., 2020

K-Cipher: A Low Latency, Bit Length Parameterizable Cipher.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
IVP: A Three Level Confusion-Diffusion Network Supporting Implicit Data Integrity.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
Cryptographic Constructions Supporting Implicit Data Integrity.
IACR Cryptol. ePrint Arch., 2018

Implicit Data Integrity: Protecting User Data without MACs.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

There is No Need to Waste Communication Bandwidth on MACs.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
Non-recursive computation of the probability of more than two people having the same birthday.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2014
HotChips security tutorial.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

Mitigating exploits, rootkits and advanced persistent threats.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

2010
Encrypting the internet.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

System-wide anatomy and tuning of a SPECweb SSL server.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2008
A hypervisor-based system for protecting software runtime memory and persistent storage.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Denial of Service Attacks Using Internet Key Exchange Protocol.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks.
Proceedings of the Managing Virtualization of Networks and Services, 2007

2004
Information Model for Describing Network Device QoS Datapath Mechanisms.
RFC, January, 2004

2002
Building intelligent traffic engineering solutions.
Proceedings of the Network Control and Engineering for QoS, 2002

2001
COPS Usage for Policy Provisioning (COPS-PR).
RFC, March, 2001

2000
COPS usage for RSVP.
RFC, January, 2000

The COPS (Common Open Policy Service) Protocol.
RFC, January, 2000


  Loading...