Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
September 12, 2005 - Sponsored by the Institute for Security Technology Studies at Dartmouth College
Research into computer security and privacy typically focuses on computation. However, since computation ultimately requires computer hardware at its base, the structure and behavior of this hardware can fundamentally shape properties of the computation it hosts. This anthology collected a set of invited papers that depict the state of the art in research into the design, use, and evaluation of hardware techniques to achieve security and privacy properties in higher-level computation.
The approach we took was to look forward at the ideas and trends emerging, and to portray the diversity of ideas and work: from architectural, application, and even programming languages perspectives, and from both academic as well as industrial areas. We wanted the text to reflect the dynamic state of this promising and emerging field.