Skip to content

Dwaine E. Clarke

  • S.B., M.Eng., Ph.D. (MIT)
  • 15h-indexImpact measure calculated using publication and citation counts. Updated daily.
  • 2503CitationsNumber of citations received by Dwaine E.'s publications. Updated daily.

Publications (20)

  • AEGIS: Architecture for tamper-evident and tamper-resistant processing

    • Suh G
    • Clarke D
    • Gassend B
    • et al.
    10Citations
    N/AReaders
  • Author retrospective AEGIS: Architecture for tamper-evident and tamper-resistant processing

    • Suh G
    • Fletcher C
    • Clarke D
    • et al.
    10Citations
    N/AReaders
  • Controlled physical random functions and applications

    • Gassend B
    • Dijk M
    • Clarke D
    • et al.
    56Citations
    N/AReaders
  • Controlled physical random functions

    • Gassend B
    • Van Dijk M
    • Clarke D
    • et al.
    9Citations
    N/AReaders
  • Speeding up exponentiation using an untrusted computational resource

    • Van Dijk M
    • Clarke D
    • Gassend B
    • et al.
    45Citations
    N/AReaders
  • Towards constant bandwidth overhead integrity checking of untrusted data

    • Clarke D
    • Suh G
    • Gassend B
    • et al.
    25Citations
    N/AReaders
  • Access-controlled resource discovery in pervasive networks

    • Raman S
    • Clarke D
    • Burnside M
    • et al.
    0Citations
    N/AReaders
  • Identification and authentication of integrated circuits

    • Gassend B
    • Lim D
    • Clarke D
    • et al.
    159Citations
    N/AReaders
  • Access-controlled resource discovery for pervasive networks

    • Raman S
    • Clarke D
    • Burnside M
    • et al.
    1Citations
    N/AReaders
  • AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing

    • Suh G
    • Clarke D
    • Gassend B
    • et al.
    329Citations
    N/AReaders
  • Caches and hash trees for efficient memory integrity verification

    • Gassend B
    • Suh G
    • Clarke D
    • et al.
    174Citations
    N/AReaders
  • Delay-based circuit authentication and applications

    • Gassend B
    • Clarke D
    • Van Dijk M
    • et al.
    59Citations
    N/AReaders
  • Efficient memory integrity verification and encryption for secure processors

    • Suh G
    • Clarke D
    • Gasend B
    • et al.
    152Citations
    N/AReaders
  • Incremental multiset hash functions and their application to memory integrity checking

    • Clarke D
    • Devadas S
    • Van Dijk M
    • et al.
    37Citations
    N/AReaders
  • Conchord: Cooperative SDSI certificate storage and name resolution

    • Ajmani S
    • Clarke D
    • Moh C
    • et al.
    18Citations
    N/AReaders
  • Controlled physical random functions

    • Gassend B
    • Clarke D
    • Van Dijk M
    • et al.
    202Citations
    N/AReaders
  • Proxy-based security protocols in networked mobile devices

    • Burnside M
    • Clarke D
    • Mills T
    • et al.
    40Citations
    N/AReaders
  • Silicon physical random functions

    • Gassend B
    • Clarke D
    • Van Dijk M
    • et al.
    912Citations
    N/AReaders
  • The untrusted computer problem and camera-based authentication

    • Clarke D
    • Gassend B
    • Kotwal T
    • et al.
    33Citations
    N/AReaders
  • Certificate chain discovery in SPKI/SDSI

    • Clarke D
    • Elien J
    • Ellison C
    • et al.
    228Citations
    N/AReaders