Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1244 | 2009 |
Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor. NL Petroni Jr, T Fraser, J Molina, WA Arbaugh USENIX security symposium, 179-194, 2004 | 757 | 2004 |
Authentication in the clouds: a framework and its application to mobile users R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010 | 211 | 2010 |
Industrial internet reference architecture SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ... Industrial Internet Consortium (IIC), Tech. Rep, 2015 | 148 | 2015 |
Method and system for implementing a mobile trusted platform module J Molina, HC Lee, JR Agre US Patent 8,522,018, 2013 | 112 | 2013 |
Industrial internet of things volume G4: security framework S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ... Ind. Internet Consort, 1-173, 2016 | 89 | 2016 |
Data protecting device Z Song, J Molina, J Gordon US Patent 8,745,747, 2014 | 69 | 2014 |
Hardware trust anchor Z Song, J Molina, J Gordon US Patent 8,505,103, 2013 | 62 | 2013 |
Method and apparatus for context-aware authentication Z Song, J Molina US Patent App. 12/816,966, 2011 | 62 | 2011 |
Wireless wallet Y Labrou, J Agre, L Ji, J Molina, WI Chen The First Annual International Conference on Mobile and Ubiquitous Systems …, 2004 | 51 | 2004 |
Using independent auditors as intrusion detection systems J Molina, W Arbaugh Information and Communications Security: 4th International Conference, ICICS …, 2002 | 41 | 2002 |
Trustcube: An infrastructure that builds trust in client Z Song, J Molina, S Lee, H Lee, S Kotani, R Masuoka Future of Trust in Computing: Proceedings of the First International …, 2009 | 36 | 2009 |
Trusted anonymous execution: A model to raise trust in cloud Z Song, J Molina, C Strong 2010 Ninth International Conference on Grid and Cloud Computing, 133-138, 2010 | 24 | 2010 |
Method and system for implementing an external trusted platform module J Molina, JR Agre US Patent 8,272,002, 2012 | 23 | 2012 |
Method and apparatus for secure information transfer to support migration S Kotani, Z Song, S Lee, J Molina, R Masuoka US Patent 9,112,681, 2015 | 22 | 2015 |
Learn how to control every room at a luxury hotel remotely: The dangers of insecure home automation deployment J Molina Black Hat USA 2014, 2014 | 22 | 2014 |
Method and apparatus for identity verification Z Song, S Kotani, S Lee, K Tanaka, H Lee, J Molina, R Masuoka, ... US Patent 8,438,385, 2013 | 21 | 2013 |
The future of authentication D Balfanz, R Chow, O Eisen, M Jakobsson, S Kirsch, S Matsumoto, ... IEEE Security & Privacy 10 (1), 22-27, 2012 | 18 | 2012 |
Method for checking the integrity of large data items rapidly Z Song, J Molina US Patent App. 12/246,144, 2010 | 18 | 2010 |
Method and apparatus for sharing documents Z Song, R Masuoka, J Molina US Patent 8,533,469, 2013 | 17 | 2013 |