The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TCG with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995-2004 (20) 2005-2006 (19) 2007 (22) 2008 (26) 2009-2011 (17) 2012-2023 (11)
Publication types (Num. hits)
article(9) incollection(2) inproceedings(103) phdthesis(1)
Venues (Conferences, Journals, ...)
STC(9) TRUST(6) ASP-DAC(4) ICYCS(4) DATE(3) ESORICS(3) ACSAC(2) ATC(2) CCECE(2) CEC(2) CHES(2) DAC(2) ICICS(2) ICWS(2) IEEE Trans. Very Large Scale I...(2) Inscrypt(2) More (+10 of total 78)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 92 occurrences of 64 keywords

Results
Found 115 publication records. Showing 115 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
173Jai-Ming Lin, Yao-Wen Chang TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
173Jai-Ming Lin, Yao-Wen Chang TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
144Jai-Ming Lin, Yao-Wen Chang TCG: A transitive closure graph-based representation for general floorplans. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
115Jai-Ming Lin, Guang-Ming Wu, Yao-Wen Chang, Jen-Hui Chuang Placement with symmetry constraints for analog layout design using TCG-S. Search on Bibsonomy ASP-DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
100Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy TCG inside?: a note on TPM specification compliance. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF test, trusted computing, compliance, TPM
100Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang Arbitrary Convex and Concave Rectilinear Module Packing Using TCG. Search on Bibsonomy DATE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
73John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
73Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang Arbitrarily shaped rectilinear module placement using the transitive closure graph representation. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
71SuGil Choi, Jin-Hee Han, Sung-Ik Jun Improvement on TCG Attestation and Its Implication for DRM. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DRM, Remote Attestation, Relay Attack, TCG
58Lihong Zhang, C.-J. Richard Shi, Yingtao Jiang Symmetry-aware placement with transitive closure graphs for analog layout design. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Leendert van Doorn Trusted computing challenges. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted computing
58Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
57Liqun Chen 0002, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble A protocol for property-based attestation. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels
56Johann Großschädl, Tobias Vejda, Dan Page Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56SuGil Choi, Jin-Hee Han, Jeong-Woo Lee 0003, Jongpil Kim, Sungik Jun Implementation of a TCG-Based Trusted Computing in Mobile Device. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Martin Schmidt 0001, Zbigniew Michalewicz Test-Case Generator TCG-2 for Nonlinear Parameter Optimisation. Search on Bibsonomy PPSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
44Johannes Winter Trusted computing building blocks for embedded linux-based ARM trustzone platforms. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF arm trustzone, mobile trusted computing, linux, virtualisation
44Fan He, Huanguo Zhang, Mei Tang A Test Method of Trusted Computing Supporting Software. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei 0001 Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper On the Deployment of Mobile Trusted Modules. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Matthew D. Luciw, Juyang Weng Topographic Class Grouping with applications to 3D object recognition. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Ahmad-Reza Sadeghi Trusted Computing - Special Aspects and Challenges. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Tilen Ma, Evangeline F. Y. Young TCG-based multi-bend bus driven floorplanning. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Segla Kpodjedo, Samuel Pierre, Makan Pourzandi Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Jill H. Y. Law, Evangeline F. Y. Young, Royce L. S. Ching Block alignment in 3D floorplan using layered TCG. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3D floorplanning, block alignment
42Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga Replay Attack in TCG Specification and Solution. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Fan Zhang, Guoqing Wu, Min Jiang, Xiaoli Liu Concerning about Trust of Platform Hardware. Search on Bibsonomy PACIIA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hardware Integrity, Trusted Computing, TCG, Integrity Measurement
29David Kyle, José Carlos Brustoloni Uclinux: a linux security module for trusted-computing-based usage controls enforcement. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG
29Georgios Kambourakis, Stefanos Gritzalis On Device Authentication in Wireless Networks: Present Issues and Future Challenges. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Device authentication, Wireless security, 802.1X, TCG
29Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung Behavioral Attestation for Business Processes. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Rui He, Lihong Zhang Analog placement design with constraints of multiple symmetry groups. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Peayton Chen, Rita Kuo, Maiga Chang, Jia-Sheng Heh Designing a Trading Card Game as Educational Reward System to Improve Students' Learning Motivations. Search on Bibsonomy Edutainment The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trading Card Game, Learning motivation, Game, Competition, Reward
29Kurt Dietrich, Johannes Winter Secure Boot Revisited. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan GroCoca: group-based peer-to-peer cooperative caching in mobile environment. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble Realizing property-based attestation and sealing with commonly available hard- and software. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF property-based attestation, property-based sealing, trusted computing
29Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf Reconfigurable trusted computing in hardware. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF field programmable gate array (FPGA), trusted computing, trusted platform module (TPM)
29Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Ahmad-Reza Sadeghi Challenges for Trusted Computing. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Kai Song, Yonghong Tian 0001, Tiejun Huang 0001 Improving the Image Retrieval Results Via Topic Coverage Graph. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF topic coverage, Image retrieval, re-rank
29Ulrich Kühn 0001, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble Secure Data Management in Trusted Computing. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Lutz Lowis, Adolf Hohl Enabling Persistent Service Links. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Jan Camenisch Better Privacy for Trusted Computing Platforms: (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan Group-Based Cooperative Cache Management for Mobile Clients in a Mobile Environment. Search on Bibsonomy ICPP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Ahmad-Reza Sadeghi, Christian Stüble Property-based attestation for computing platforms: caring about properties, not mechanisms. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Veyis Nuri, Roberto H. Bamberger Size-limited filter banks for subband image compression. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
27Thorsten P. Stremlau Protecting IoT Ecosystems and AI Leveraging TCG Standards. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  BibTeX  RDF
27Dmitriy S. Koltunov, Vasily Yu. Efimov, Vartan A. Padaryan Automated Testing of a TCG Frontend for Qemu. Search on Bibsonomy Program. Comput. Softw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Lian He, Zhenxin Zhao, Yuanzhu Chen 0001, Lihong Zhang Placement with Sequence-Pair-Driven TCG for Advanced Analog Constraints. Search on Bibsonomy CCECE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Juncal Alonso, Marisa Escalante, Leire Orue-Echevarria Transformational Cloud Government (TCG): Transforming Public Administrations with a Cloud of Public Services. Search on Bibsonomy Cloud Forward The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Taher Kourany, Emad Hegazi, Yehea Ismail TCG-SP: An improved floorplan representation based on an efficient hybrid of Transitive Closure Graph and Sequence Pair. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Mudassar Aslam, Christian Gehrmann, Mats Björkman ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Monami Takahashi, Keisuke Irie, Mizuki Sakamoto, Tatsuo Nakajima Incorporating fictionality into the real space: a case of enhanced TCG. Search on Bibsonomy UbiComp/ISWC Adjunct The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Laryssa Lima Muniz, Ubiratan S. C. Netto, Paulo Henrique M. Maia TCG - A Model-based Testing Tool for Functional and Statistical Testing. Search on Bibsonomy ICEIS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Roberto Sassu, Gianluca Ramunno, Antonio Lioy Practical Assessment of Biba Integrity for TCG-Enabled Platforms. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Muhannad Mujahed, Hussein Jaddu, Dirk Fischer 0001, Bärbel Mertsching Tangential Closest Gap based (TCG) reactive obstacle avoidance navigation for cluttered environments. Search on Bibsonomy SSRR The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Xiaolin Chang, Bin Xing, Jiqiang Liu, Zhonglan Yuan, Longmei Sun Robust and Efficient Response to TCG TOCTOU Attacks in TPVM. Search on Bibsonomy PDCAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27 TCG Trusted Computing Group. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Liqun Chen 0002, Ming-Feng Lee, Bogdan Warinschi Security of the Enhanced TCG Privacy-CA Solution. Search on Bibsonomy TGC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Aimin Yu, Shijun Zhao Enhancing Flexibility of TCG's TNC through Layered Property Attestation. Search on Bibsonomy TrustCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yiming Li, Yi Li, Mingtian Zhou Area Optimization in Floorplanning Using AP-TCG. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2010 DBLP  BibTeX  RDF
27Rui He, Lihong Zhang Symmetry-aware TCG-based placement design under complex multi-group constraints for analog circuit layouts. Search on Bibsonomy ASP-DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 Modeling TCG-Based Secure Systems with Colored Petri Nets. Search on Bibsonomy INTRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Liqun Chen 0002, Bogdan Warinschi Security of the TCG Privacy-CA Solution. Search on Bibsonomy EUC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala LWRM: A lightweight response mechanism for TCG TOCTOU attack. Search on Bibsonomy IPCCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Liqun Chen 0002, Mark Ryan 0001 Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Ammar Alkassar, Utz Gnaida, Thomas Quirin MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels "Trusted Computing". Search on Bibsonomy Sicherheit The full citation details ... 2008 DBLP  BibTeX  RDF
27Yuri Demchenko, Leon Gommans, Cees de Laat Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment. Search on Bibsonomy CTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga Security Evaluation of Scenarios Based on the TCG's TPM Specification. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Adolf Hohl Vertrauliche und nachvollziehbare Verarbeitung von Nutzerdaten in Informationsdiensten auf der Basis von TCG. Search on Bibsonomy 2006   RDF
27Reiner Sailer, Xiaolan Zhang 0001, Trent Jaeger, Leendert van Doorn Design and Implementation of a TCG-based Integrity Measurement Architecture. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2004 DBLP  BibTeX  RDF
27Jai-Ming Lin, Yao-Wen Chang TCG: A Transitive Closure Graph-Based Representation for Non-Slicing Floorplans. Search on Bibsonomy DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27M. Schmidt, Zbigniew Michalewicz Test-case generator TCG-2 for nonlinear parameter optimisation. Search on Bibsonomy CEC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan A practical property-based bootstrap architecture. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot
15Yu Qin, Dengguo Feng, Zhen Xu An Anonymous Property-Based Attestation Protocol from Bilinear Maps. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan A Property-Dependent Agent Transfer Protocol. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner A PrivacyCA for Anonymity and Trust. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base
15Adrian Perrig Building Secure Networked Systems with Code Attestation. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Najwa Aaraj, Anand Raghunathan, Niraj K. Jha Analysis and design of a hardware/software trusted platform module for embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded systems, multiprocessor systems, Custom instructions
15Gergely Tóth, Gábor Koszegi, Zoltán Hornák Case study: automated security testing on the trusted computing platform. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Flinder, OpenTC, automated security testing, trusted computing
15Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 A System Architecture for Reconfigurable Trusted Platforms. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Frederic Stumpf, Claudia Eckert 0001, Shane Balfe Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation
15Kurt Dietrich A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Qi Cui, Wenchang Shi An Approach for Compliance Validation of Trusted Computing Applications. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi Property-Based Attestation without a Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy
15Nobuto Fujii, Mitsuyo Hashida, Haruhiro Katayose Strategy-acquisition system for video trading card game. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strategy acquisition, trading card game, machine learning, video game, COM
15Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 A New Direct Anonymous Attestation Scheme from Bilinear Maps. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module
15Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith TOCTOU, Traps, and Trusted Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Paul England, Jork Löser Para-Virtualized TPM Sharing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Adrian Leung, Liqun Chen 0002, Chris J. Mitchell On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Privacy, Trusted Computing, DAA
15Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama ws-Attestation: Enabling Trusted Computing on Web Services. Search on Bibsonomy Test and Analysis of Web Services The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Jing Zhan, Huanguo Zhang, Fei Yan Building Trusted Sub-domain for the Grid with Trusted Computing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security
15Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha Energy and execution time analysis of a software-based trusted platform module. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, anonymity, cryptographic protocol, trusted computing
15Michael A. Arbib, JinYong Lee Vision and Action in the Language-Ready Brain: From Mirror Neurons to SemRep. Search on Bibsonomy BVAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF brain mechanisms, competition and cooperation, construction grammar, dynamic visual scenes, language perception, language production, mirror neurons, SemRep, visual perception, vision, action, action recognition, schema theory, scene descriptions
15Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier Establishing Chain of Trust in Reconfigurable Hardware. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 An Approach to a Trustworthy System Architecture Using Virtualization. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo Security and dynamics in customer controlled virtual workspace organisation. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation
15Mooseop Kim, Jaecheol Ryou 0001 Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15ZhenLiu Zhou, RongSheng Xu BIOS Security Analysis and a Kind of Trusted BIOS. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust Measurement, BIOS, UEFI, Trusted Computing, TPM
Displaying result #1 - #100 of 115 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license