Jesus Molina
Jesus Molina
Independent Consultant, Jesus Molina Consulting
Verified email at - Homepage
Cited by
Cited by
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor.
NL Petroni Jr, T Fraser, J Molina, WA Arbaugh
USENIX security symposium, 179-194, 2004
Authentication in the clouds: a framework and its application to mobile users
R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
Method and system for implementing a mobile trusted platform module
J Molina, HC Lee, JR Agre
US Patent 8,522,018, 2013
Industrial internet of things volume G4: security framework
S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ...
Ind. Internet Consort, 1-173, 2016
Data protecting device
Z Song, J Molina, J Gordon
US Patent 8,745,747, 2014
Hardware trust anchor
Z Song, J Molina, J Gordon
US Patent 8,505,103, 2013
Method and apparatus for context-aware authentication
Z Song, J Molina
US Patent App. 12/816,966, 2011
Wireless wallet
Y Labrou, J Agre, L Ji, J Molina, WI Chen
The First Annual International Conference on Mobile and Ubiquitous Systems …, 2004
Using independent auditors as intrusion detection systems
J Molina, W Arbaugh
Information and Communications Security: 4th International Conference, ICICS …, 2002
Trustcube: An infrastructure that builds trust in client
Z Song, J Molina, S Lee, H Lee, S Kotani, R Masuoka
Future of Trust in Computing: Proceedings of the First International …, 2009
Trusted anonymous execution: A model to raise trust in cloud
Z Song, J Molina, C Strong
2010 Ninth International Conference on Grid and Cloud Computing, 133-138, 2010
Learn how to control every room at a luxury hotel remotely: The dangers of insecure home automation deployment
J Molina
Black Hat USA 2014, 2014
Method and system for implementing an external trusted platform module
J Molina, JR Agre
US Patent 8,272,002, 2012
Method and apparatus for secure information transfer to support migration
S Kotani, Z Song, S Lee, J Molina, R Masuoka
US Patent 9,112,681, 2015
Method and apparatus for identity verification
Z Song, S Kotani, S Lee, K Tanaka, H Lee, J Molina, R Masuoka, ...
US Patent 8,438,385, 2013
The future of authentication
D Balfanz, R Chow, O Eisen, M Jakobsson, S Kirsch, S Matsumoto, ...
IEEE Security & Privacy 10 (1), 22-27, 2012
Method for checking the integrity of large data items rapidly
Z Song, J Molina
US Patent App. 12/246,144, 2010
Method and apparatus for sharing documents
Z Song, R Masuoka, J Molina
US Patent 8,533,469, 2013
The system can't perform the operation now. Try again later.
Articles 1–20