Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
173 | Jai-Ming Lin, Yao-Wen Chang |
TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(6), pp. 968-980, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
173 | Jai-Ming Lin, Yao-Wen Chang |
TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 842-847, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
144 | Jai-Ming Lin, Yao-Wen Chang |
TCG: A transitive closure graph-based representation for general floorplans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 13(2), pp. 288-292, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
115 | Jai-Ming Lin, Guang-Ming Wu, Yao-Wen Chang, Jen-Hui Chuang |
Placement with symmetry constraints for analog layout design using TCG-S. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 2005 Conference on Asia South Pacific Design Automation, ASP-DAC 2005, Shanghai, China, January 18-21, 2005, pp. 1135-1137, 2005, ACM Press, 0-7803-8737-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
100 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 47-56, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
100 | Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang |
Arbitrary Convex and Concave Rectilinear Module Packing Using TCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2002 Design, Automation and Test in Europe Conference and Exposition (DATE 2002), 4-8 March 2002, Paris, France, pp. 69-75, 2002, IEEE Computer Society, 0-7695-1471-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
73 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 294-303, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
73 | Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang |
Arbitrarily shaped rectilinear module placement using the transitive closure graph representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 10(6), pp. 886-901, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
71 | SuGil Choi, Jin-Hee Han, Sung-Ik Jun |
Improvement on TCG Attestation and Its Implication for DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 912-925, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DRM, Remote Attestation, Relay Attack, TCG |
58 | Lihong Zhang, C.-J. Richard Shi, Yingtao Jiang |
Symmetry-aware placement with transitive closure graphs for analog layout design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 13th Asia South Pacific Design Automation Conference, ASP-DAC 2008, Seoul, Korea, January 21-24, 2008, pp. 180-185, 2008, IEEE, 978-1-4244-1921-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Leendert van Doorn |
Trusted computing challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 1, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
58 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 7-14, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
57 | Liqun Chen 0002, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble |
A protocol for property-based attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 7-16, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels |
56 | Johann Großschädl, Tobias Vejda, Dan Page |
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings, pp. 84-90, 2008, IEEE Computer Society, 978-1-4244-2401-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | SuGil Choi, Jin-Hee Han, Jeong-Woo Lee 0003, Jongpil Kim, Sungik Jun |
Implementation of a TCG-Based Trusted Computing in Mobile Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 18-27, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Martin Schmidt 0001, Zbigniew Michalewicz |
Test-Case Generator TCG-2 for Nonlinear Parameter Optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN VI, 6th International Conference, Paris, France, September 18-20, 2000, Proceedings, pp. 539-548, 2000, Springer, 3-540-41056-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Johannes Winter |
Trusted computing building blocks for embedded linux-based ARM trustzone platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-30, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
arm trustzone, mobile trusted computing, linux, virtualisation |
44 | Fan He, Huanguo Zhang, Mei Tang |
A Test Method of Trusted Computing Supporting Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2330-2334, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei 0001 |
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2347-2353, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper |
On the Deployment of Mobile Trusted Modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 3169-3174, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Matthew D. Luciw, Juyang Weng |
Topographic Class Grouping with applications to 3D object recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 3987-3994, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Ahmad-Reza Sadeghi |
Trusted Computing - Special Aspects and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM ![In: SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Proceedings, pp. 98-117, 2008, Springer, 978-3-540-77565-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Tilen Ma, Evangeline F. Y. Young |
TCG-based multi-bend bus driven floorplanning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 13th Asia South Pacific Design Automation Conference, ASP-DAC 2008, Seoul, Korea, January 21-24, 2008, pp. 192-197, 2008, IEEE, 978-1-4244-1921-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Segla Kpodjedo, Samuel Pierre, Makan Pourzandi |
Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 518-519, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jill H. Y. Law, Evangeline F. Y. Young, Royce L. S. Ching |
Block alignment in 3D floorplan using layered TCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30 - May 1, 2006, pp. 376-380, 2006, ACM, 1-59593-347-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
3D floorplanning, block alignment |
42 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga |
Replay Attack in TCG Specification and Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 127-137, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Fan Zhang, Guoqing Wu, Min Jiang, Xiaoli Liu |
Concerning about Trust of Platform Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (2) ![In: PACIIA 2008, Volume 2, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 852-856, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Integrity, Trusted Computing, TCG, Integrity Measurement |
29 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 63-70, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
29 | Georgios Kambourakis, Stefanos Gritzalis |
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 135-144, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Device authentication, Wireless security, 802.1X, TCG |
29 | Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung |
Behavioral Attestation for Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 343-350, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Rui He, Lihong Zhang |
Analog placement design with constraints of multiple symmetry groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 1204-1207, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peayton Chen, Rita Kuo, Maiga Chang, Jia-Sheng Heh |
Designing a Trading Card Game as Educational Reward System to Improve Students' Learning Motivations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Edutainment ![In: Learning by Playing. Game-based Education System Design and Development, 4th International Conference on E-Learning and Games, Edutainment 2009, Banff, Canada, August 9-11, 2009. Proceedings, pp. 175, 2009, Springer, 978-3-642-03363-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trading Card Game, Learning motivation, Game, Competition, Reward |
29 | Kurt Dietrich, Johannes Winter |
Secure Boot Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2360-2365, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan |
GroCoca: group-based peer-to-peer cooperative caching in mobile environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 25(1), pp. 179-191, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 50-57, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
29 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 15-20, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
29 | Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 |
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 472-481, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ahmad-Reza Sadeghi |
Challenges for Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 414, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Kai Song, Yonghong Tian 0001, Tiejun Huang 0001 |
Improving the Image Retrieval Results Via Topic Coverage Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings, pp. 193-200, 2006, Springer, 3-540-48766-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
topic coverage, Image retrieval, re-rank |
29 | Ulrich Kühn 0001, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble |
Secure Data Management in Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 324-338, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Lutz Lowis, Adolf Hohl |
Enabling Persistent Service Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 301-306, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 73-88, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan |
Group-Based Cooperative Cache Management for Mobile Clients in a Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 33rd International Conference on Parallel Processing (ICPP 2004), 15-18 August 2004, Montreal, Quebec, Canada, pp. 83-90, 2004, IEEE Computer Society, 0-7695-2197-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ahmad-Reza Sadeghi, Christian Stüble |
Property-based attestation for computing platforms: caring about properties, not mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pp. 67-77, 2004, ACM, 1-59593-076-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Veyis Nuri, Roberto H. Bamberger |
Size-limited filter banks for subband image compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 4(9), pp. 1317-1323, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
27 | Thorsten P. Stremlau |
Protecting IoT Ecosystems and AI Leveraging TCG Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 11, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
27 | Dmitriy S. Koltunov, Vasily Yu. Efimov, Vartan A. Padaryan |
Automated Testing of a TCG Frontend for Qemu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Program. Comput. Softw. ![In: Program. Comput. Softw. 46(8), pp. 737-746, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Lian He, Zhenxin Zhao, Yuanzhu Chen 0001, Lihong Zhang |
Placement with Sequence-Pair-Driven TCG for Advanced Analog Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2020, London, ON, Canada, August 30 - September 2, 2020, pp. 1-4, 2020, IEEE, 978-1-7281-5442-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Juncal Alonso, Marisa Escalante, Leire Orue-Echevarria |
Transformational Cloud Government (TCG): Transforming Public Administrations with a Cloud of Public Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cloud Forward ![In: 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, Madrid, Spain, 18-20 October, 2016., pp. 43-52, 2016, Elsevier. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Taher Kourany, Emad Hegazi, Yehea Ismail |
TCG-SP: An improved floorplan representation based on an efficient hybrid of Transitive Closure Graph and Sequence Pair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montréal, QC, Canada, May 22-25, 2016, pp. 1934-1937, 2016, IEEE, 978-1-4799-5341-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Mudassar Aslam, Christian Gehrmann, Mats Björkman |
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 22, pp. 28-39, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Monami Takahashi, Keisuke Irie, Mizuki Sakamoto, Tatsuo Nakajima |
Incorporating fictionality into the real space: a case of enhanced TCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp/ISWC Adjunct ![In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, UbiComp/ISWC Adjunct 2015, Osaka, Japan, September 7-11, 2015, pp. 37-40, 2015, ACM, 978-1-4503-3575-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Laryssa Lima Muniz, Ubiratan S. C. Netto, Paulo Henrique M. Maia |
TCG - A Model-based Testing Tool for Functional and Statistical Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (2) ![In: ICEIS 2015 - Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2, Barcelona, Spain, 27-30 April, 2015, pp. 404-411, 2015, SciTePress, 978-989-758-097-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Roberto Sassu, Gianluca Ramunno, Antonio Lioy |
Practical Assessment of Biba Integrity for TCG-Enabled Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pp. 495-504, 2014, IEEE Computer Society, 978-1-4799-6513-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Muhannad Mujahed, Hussein Jaddu, Dirk Fischer 0001, Bärbel Mertsching |
Tangential Closest Gap based (TCG) reactive obstacle avoidance navigation for cluttered environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSRR ![In: IEEE International Symposium on Safety, Security, and Rescue Robotics, SSRR 2013, Linköping, Sweden, October 21-26, 2013, pp. 1-6, 2013, IEEE, 978-1-4799-0880-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Xiaolin Chang, Bin Xing, Jiqiang Liu, Zhonglan Yuan, Longmei Sun |
Robust and Efficient Response to TCG TOCTOU Attacks in TPVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2012, Beijing, China, December 14-16, 2012, pp. 323-328, 2012, IEEE, 978-0-7695-4879-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | |
TCG Trusted Computing Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1279, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Ming-Feng Lee, Bogdan Warinschi |
Security of the Enhanced TCG Privacy-CA Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers, pp. 121-141, 2011, Springer, 978-3-642-30064-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Aimin Yu, Shijun Zhao |
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 751-756, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yiming Li, Yi Li, Mingtian Zhou |
Area Optimization in Floorplanning Using AP-TCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Convergence Inf. Technol. ![In: J. Convergence Inf. Technol. 5(10), pp. 216-222, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
27 | Rui He, Lihong Zhang |
Symmetry-aware TCG-based placement design under complex multi-group constraints for analog circuit layouts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 15th Asia South Pacific Design Automation Conference, ASP-DAC 2010, Taipei, Taiwan, January 18-21, 2010, pp. 299-304, 2010, IEEE, 978-1-60558-837-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 |
Modeling TCG-Based Secure Systems with Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 67-86, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Bogdan Warinschi |
Security of the TCG Privacy-CA Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010, pp. 609-616, 2010, IEEE Computer Society, 978-0-7695-4322-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala |
LWRM: A lightweight response mechanism for TCG TOCTOU attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 28th International Performance Computing and Communications Conference, IPCCC 2009, 14-16 December 2009, Phoenix, Arizona, USA, pp. 200-207, 2009, IEEE Computer Society, 978-1-4244-5737-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Mark Ryan 0001 |
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers, pp. 201-216, 2009, Springer, 978-3-642-12458-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ammar Alkassar, Utz Gnaida, Thomas Quirin |
MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels "Trusted Computing". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., pp. 575-580, 2008, GI, 978-3-88579-222-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2007 International Symposium on Collaborative Technologies and Systems, CTS 2007, Orlando, Florida, USA, May 21-25, 2007, pp. 57-65, 2007, IEEE, 0-9785699-1-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 438-453, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Adolf Hohl |
Vertrauliche und nachvollziehbare Verarbeitung von Nutzerdaten in Informationsdiensten auf der Basis von TCG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
27 | Reiner Sailer, Xiaolan Zhang 0001, Trent Jaeger, Leendert van Doorn |
Design and Implementation of a TCG-based Integrity Measurement Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, pp. 223-238, 2004, USENIX. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
27 | Jai-Ming Lin, Yao-Wen Chang |
TCG: A Transitive Closure Graph-Based Representation for Non-Slicing Floorplans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 38th Design Automation Conference, DAC 2001, Las Vegas, NV, USA, June 18-22, 2001, pp. 764-769, 2001, ACM, 1-58113-297-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | M. Schmidt, Zbigniew Michalewicz |
Test-case generator TCG-2 for nonlinear parameter optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: Proceedings of the 2000 Congress on Evolutionary Computation, CEC 2000, La Jolla, CA, USA, July 16-19, 2000., pp. 728-735, 2000, IEEE, 0-7803-6375-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
15 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 29-38, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
15 | Yu Qin, Dengguo Feng, Zhen Xu |
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 732-738, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan |
A Property-Dependent Agent Transfer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 240-263, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 101-119, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
15 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 278, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Analysis and design of a hardware/software trusted platform module for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 8(1), pp. 8:1-8:31, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
embedded systems, multiprocessor systems, Custom instructions |
15 | Gergely Tóth, Gábor Koszegi, Zoltán Hornák |
Case study: automated security testing on the trusted computing platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 35-39, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Flinder, OpenTC, automated security testing, trusted computing |
15 | Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 |
A System Architecture for Reconfigurable Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 541-544, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 376-382, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
15 | Kurt Dietrich |
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2137-2142, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Qi Cui, Wenchang Shi |
An Approach for Compliance Validation of Trusted Computing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 574-579, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 31-46, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
15 | Nobuto Fujii, Mitsuyo Hashida, Haruhiro Katayose |
Strategy-acquisition system for video trading card game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2008, Yokohama, Japan, December 3-5, 2008, pp. 175-182, 2008, ACM, 978-1-60558-393-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strategy acquisition, trading card game, machine learning, video game, COM |
15 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 166-178, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
15 | Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith |
TOCTOU, Traps, and Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 14-32, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Paul England, Jork Löser |
Para-Virtualized TPM Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 119-132, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Leung, Liqun Chen 0002, Chris J. Mitchell |
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 179-190, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Privacy, Trusted Computing, DAA |
15 | Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama |
ws-Attestation: Enabling Trusted Computing on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Test and Analysis of Web Services ![In: Test and Analysis of Web Services, pp. 441-469, 2007, Springer, 978-3-540-72912-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 463-471, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
15 | Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Energy and execution time analysis of a software-based trusted platform module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1128-1133, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 218-231, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
15 | Michael A. Arbib, JinYong Lee |
Vision and Action in the Language-Ready Brain: From Mirror Neurons to SemRep. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BVAI ![In: Advances in Brain, Vision, and Artificial Intelligence, Second International Symposium, BVAI 2007, Naples, Italy, October 10-12, 2007, Proceedings, pp. 104-123, 2007, Springer, 978-3-540-75554-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
brain mechanisms, competition and cooperation, construction grammar, dynamic visual scenes, language perception, language production, mirror neurons, SemRep, visual perception, vision, action, action recognition, schema theory, scene descriptions |
15 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier |
Establishing Chain of Trust in Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA, pp. 289-290, 2007, IEEE Computer Society, 0-7695-2940-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 410-419, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 191-202, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo |
Security and dynamics in customer controlled virtual workspace organisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 231-232, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation |
15 | Mooseop Kim, Jaecheol Ryou 0001 |
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 375-385, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | ZhenLiu Zhou, RongSheng Xu |
BIOS Security Analysis and a Kind of Trusted BIOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 427-437, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust Measurement, BIOS, UEFI, Trusted Computing, TPM |