Roger Khazan

According to our database1, Roger Khazan authored at least 18 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security-as-a-Service for Embedded Systems.
Proceedings of the IEEE Military Communications Conference, 2023

Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2023

2021
Practical Principle of Least Privilege for Secure Embedded Systems.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

2020
Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2018
Mission Assurance: Beyond Secure Processing.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Leveraging Intel SGX Technology to Protect Security-Sensitive Applications.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Functionality and Security Co-design Environment for Embedded Systems.
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018

2017
Towards a universal CDAR device: A high-performance adapter-based inline media encryptor.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Secure architecture for embedded systems.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

2013
SHAMROCK: self contained cryptography and key management processor.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2005
A Wide Area Network Simulation of Single-Round Group Membership Algorithms.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

2000
An inheritance-based technique for building simulation proofs incrementally.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

A Client-Server Approach to Virtually Synchronous Group Multicast: Specifications and Algorithms.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1998
Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service.
Proceedings of the Distributed Computing, 12th International Symposium, 1998

1996
Parsing with Prefix and Suffix Dictionaries.
Proceedings of the 6th Data Compression Conference (DCC '96), Snowbird, Utah, USA, March 31, 1996


  Loading...