|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 204 occurrences of 106 keywords
|
|
|
Results
Found 777 publication records. Showing 777 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
154 | Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo |
Layering negotiations for flexible attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 17-20, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed coalition, trusted virtual domains, trusted computing, remote attestation |
150 | Elaine Shi, Adrian Perrig, Leendert van Doorn |
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 154-168, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
146 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali |
Behavioral attestation for web services (BA4WS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-28, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavioral attestation, web services, remote attestation |
123 | Ge Cheng |
Unattended Remote Attestation Delegation for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 204-207, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
123 | Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei 0001 |
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2347-2353, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
119 | Frederic Stumpf, Andreas Fuchs 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Improving the scalability of platform attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 1-10, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attestation protocols, integrity reporting, performance, scalability, trusted computing, remote attestation |
119 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert |
Model-based behavioral attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 175-184, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavioral attestation, highlevel framework, remote attestation, UCON |
119 | Liqun Chen 0002, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble |
A protocol for property-based attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 7-16, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels |
109 | Yu Qin, Dengguo Feng, Zhen Xu |
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 732-738, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
109 | George Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, Brian T. Sniffen |
Attestation: Evidence and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 1-18, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
109 | Ahmad-Reza Sadeghi, Christian Stüble |
Property-based attestation for computing platforms: caring about properties, not mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pp. 67-77, 2004, ACM, 1-59593-076-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
101 | Corin Pitcher, James Riely |
Dynamic Policy Discovery with Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoSSaCS ![In: Foundations of Software Science and Computation Structures, 9th International Conference, FOSSACS 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25-31, 2006, Proceedings, pp. 111-125, 2006, Springer, 3-540-33045-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
code-identity based access control, policy establishment, Next Generation Secure Computing Base, ?-calculus, key establishment, remote attestation |
98 | Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Hiroshi Maruyama |
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 743-750, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Xiaoyong Li, Chang-xiang Shen, Xiao-Dong Zuo |
An Efficient Attestation for Trustworthiness of Computing Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 625-630, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
87 | Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente |
On the difficulty of software-based attestation of embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 400-409, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
indisputable code execution, return-oriented programming, software-based attestation, swatt, wireless sensor networks, embedded systems, code compression |
87 | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
A Demonstrative Ad Hoc Attestation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 17-30, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Kiosk computing, platform integrity, smart cards, Trusted computing, attestation |
87 | Christoph Krauß, Frederic Stumpf, Claudia Eckert 0001 |
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 203-217, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Sensor Network, Trusted Computing, Attestation |
83 | Jiqiang Liu, Jia Zhao 0005, Zhen Han |
A remote anonymous attestation protocol in trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim |
Remote Software-Based Attestation for Wireless Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 27-41, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Leendert van Doorn |
Trusted computing challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 1, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
74 | Hailun Tan, Wen Hu, Sanjay Jha 0001 |
A hardware-based remote attestation protocol in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 9th International Conference on Information Processing in Sensor Networks, IPSN 2010, April 12-16, 2010, Stockholm, Sweden, pp. 378-379, 2010, ACM, 978-1-60558-988-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, trusted platform module, remote attestation |
74 | Daniel M. Hein, Ronald Toegl |
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 46-57, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mobile Agents, Trusted Computing, Attestation, Disaster Response |
74 | Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali |
Remote Attestation of Attribute Updates and Information Flows in a UCON System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 63-80, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, Information flow, usage control, remote attestation |
74 | Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei 0001 |
Remote attestation on program execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 11-20, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, program dependency, remote attestation |
74 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 31-46, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
74 | SuGil Choi, Jin-Hee Han, Sung-Ik Jun |
Improvement on TCG Attestation and Its Implication for DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 912-925, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DRM, Remote Attestation, Relay Attack, TCG |
69 | Rongwei Yu, Lina Wang, Xiao-yan Ma, Bo Kuang |
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 721-726, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
69 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 134-148, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
69 | Michael LeMay, Carl A. Gunter |
Cumulative Attestation Kernels for Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 655-670, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
69 | Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama |
ws-Attestation: Enabling Trusted Computing on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Test and Analysis of Web Services ![In: Test and Analysis of Web Services, pp. 441-469, 2007, Springer, 978-3-540-72912-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Muhammad Asim Jamshed, Wonho Kim, KyoungSoo Park |
Suppressing bot traffic with accurate human attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ApSys ![In: Proceedings of the 1st ACM SIGCOMM Asia-Pacific Workshop on Systems, ApSys 2010, New Delhi, India, August 30, 2010, pp. 43-48, 2010, ACM, 978-1-4503-0195-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
bot traffic suppression, human attestation, networked system security, trusted computing |
61 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(5), pp. 315-330, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Direct anonymous attestation, User-controlled-anonymity, User-controlled-traceability, Trusted computing, Bilinear maps |
61 | Ronald Toegl |
Tagging the Turtle: Local Attestation for Kiosk Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 60-69, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Kiosk Computing, Trusted Computing, Near Field Communication, Attestation |
61 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 166-178, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
61 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 50-57, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
56 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 71-82, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Hua Wang, Yao Guo 0001, Xiangqun Chen |
SAConf: Semantic Attestation of Software Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 120-133, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 278, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa |
On-the-fly attestation of reconfigurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: FPL 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008, pp. 71-76, 2008, IEEE, 978-1-4244-1961-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Julian Jang, Surya Nepal, John Zic |
Establishing a Trust Relationship in Cooperative Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 426-443, 2006, Springer, 3-540-48287-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy |
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 49-54, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attestation systems, integrity monitoring, return-oriented programming |
47 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 376-382, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
47 | Arvind Seshadri, Mark Luk, Adrian Perrig |
SAKE: Software Attestation for Key Establishment in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, 4th IEEE International Conference, DCOSS 2008, Santorini Island, Greece, June 11-14, 2008, Proceedings, pp. 372-385, 2008, Springer, 978-3-540-69169-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software attestation, sensor networks, Key establishment |
47 | Adrian Leung, Liqun Chen 0002, Chris J. Mitchell |
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 179-190, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Privacy, Trusted Computing, DAA |
47 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 16-30, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
47 | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
SCUBA: Secure Code Update By Attestation in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006, pp. 85-94, 2006, ACM, 1-59593-557-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
externally-verifiable code execution, secure code update, self-checksumming code, software-based attestation |
47 | Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik |
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021., pp. 37-47, 2021, ACM, 978-1-4503-8349-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
45 | Juan Du 0006, Wei Wei, Xiaohui Gu, Ting Yu 0001 |
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 293-304, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secure dataflow processing, service integrity attestation, cloud computing |
45 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 29-38, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
45 | Dongbo Wang, Ai-Min Wang |
Trust Maintenance Toward Virtual Computing Environment in the Grid Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings, pp. 166-177, 2008, Springer, 978-3-540-78848-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust Attestation, trusted loading, virtual machine, virtual computing environment |
43 | Wenchao Huang, Yan Xiong, Depin Chen |
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 809-816, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | John Lyle, Andrew P. Martin |
On the Feasibility of Remote Attestation for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 283-288, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli |
Measuring Semantic Integrity for Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 81-100, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Carsten Rudolph |
Covert Identity Information in Direct Anonymous Attestation (DAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 443-448, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Kenneth A. Goldman, Ronald Perez, Reiner Sailer |
Linking remote attestation to secure tunnel endpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 21-24, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certificates, trusted platform module |
43 | Xiaoyong Li, Zhen Han, Chang-xiang Shen |
Software Complexity Based Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 220-224, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Andrea Bottoni, Gianluca Dini, Evangelos Kranakis |
Credentials and Beliefs in Remote Trusted Platforms Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 662-667, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Ana Isabel González-Tablas Ferreres, Klaus Kursawe, Benjamín Ramos, Arturo Ribagorda |
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 797-806, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
SWATT: SoftWare-based ATTestation for Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pp. 272-, 2004, IEEE Computer Society, 0-7695-2136-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Kurt Dietrich, Martin Pirker, Tobias Vejda, Ronald Toegl, Thomas Winkler 0002, Peter Lipp |
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 156-168, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 31-34, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
34 | Noriyasu Yamamoto, Toshihiko Wakahara |
Improvement of Encryption Processing Speed for a User Attestation System Using a Cellular Phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 602-606, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
user attestation system, two-dimensional code, password, cellular phone, digital camera |
34 | Thomas Winkler 0002, Bernhard Rinner |
User-Based Attestation for Trustworthy Visual Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC/UMC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2010 and IEEE International Workshop on Ubiquitous and Mobile Computing, UMC 2010, 7-9 June 2010, Newport Beach, California, USA, pp. 74-81, 2010, IEEE Computer Society, 978-0-7695-4049-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Visual Sensor Networks, User-Based Attestation, Trusted Computing, Smart Cameras |
34 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 143-158, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
34 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery |
Property Based Attestation and Trusted Computing: Analysis and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 278-285, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Property Attestation, Trusted Computing |
34 | Ing-Ray Chen, Ding-Chau Wang |
On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN 2009, Kaohsiung, Taiwan, December 14-16, 2009, pp. 184-189, 2009, IEEE Computer Society, 978-0-7695-3908-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software-based attestation, Wireless sensor networks, performance evaluation, reliability, intrusion detection |
34 | Paul England |
Practical Techniques for Operating System Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 1-13, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security distributed systems, trusted computing, security models, attestation |
32 | Po-Wah Yau, Allan Tomlinson, Shane Balfe, Eimear Gallery |
Securing Grid Workflows with Trusted Computing (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 700, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Grid, Workflow, Trusted Computing, Attestation, Sealing |
32 | Charalampos Z. Patrikakis, Pantelis N. Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-Ching S. Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri |
Security and Privacy in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 73-75, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
technology awareness, context-aware mobile services, electronic data, k-anonymity techniques, attestation services, pitch shifting, voice morphing, security, privacy, pervasive computing, encryption, user needs, speaker identification, sensing technology, e-passport |
32 | Andrew Cirillo, James Riely |
Access Control Based on Code Identity for Open Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 169-185, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Compound Principals, Higher-Order Pi Calculus, Access Control, Typing, Trusted Computing, Remote Attestation, Authorization Logic |
32 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan |
Beyond secure channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 30-40, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack |
32 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 463-471, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
32 | Geoffrey Strongin |
The role of trusted computing in internet scale DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 25-26, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XDI, XRI, digital rights management, trusted computing, attestation, data interchange |
32 | Juan A. Garay, Lorenz Huelsbergen |
Software integrity protection using timed executable agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 189-200, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile code and agent security, software-based attestation, intrusion detection, data integrity, program analysis |
31 | Jonathan Certes |
Méthodes et modèles pour la vérification formelle de l'attestation à distance sur microprocesseur. (Method and models for formal verification of remote attestation on microprocessors). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
31 | Léo Robert |
Design and analysis of provably secure protocols: Applications to messaging and attestation. (Conceptions et analyses de protocoles en sécurité prouvable: applications aux messageries et à l'attestation). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
31 | Aïda Diop |
Cryptographic mechanisms for device authentication and attestation in the internet of things. (Protocoles cryptographiques pour l'authentification et l'attestation anonymes dans l'internet des objets). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
31 | Christoph Krauß |
Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection (Erkennung kompromittierter Knoten in drahtlosen Sensornetzen: Erkennung basierend auf Fehlverhalten im Vergleich zu Erkennung mittels Attestation). ![Search on Bibsonomy](Pics/bibsonomy.png) |
it Inf. Technol. ![In: it Inf. Technol. 52(6), pp. 325-330, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser 0001 |
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 63-77, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Xiaofeng Chen 0004, Dengguo Feng |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2308-2313, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Michael Backes 0001, Matteo Maffei, Dominique Unruh |
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 202-215, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
zero-knowledge, Language-based security, automated verification, applied pi-calculus |
29 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 218-231, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
29 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 21-30, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
29 | Patrick P. Tsang, Victor K. Wei |
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 48-60, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Reiner Sailer, Trent Jaeger, Xiaolan Zhang 0001, Leendert van Doorn |
Attestation-based policy enforcement for remote access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 308-317, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, security management, remote access |
29 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 132-145, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
27 | Yi Yang 0002, Xinran Wang, Sencun Zhu, Guohong Cao |
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(4), pp. 18:1-18:43, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
commit-and-attest, hop-by-hop, probabilistic grouping, Data aggregation, sensor network security |
27 | Kurt Dietrich |
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2137-2142, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran |
An Access Control Scheme for Protecting Personal Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 24-35, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | SuGil Choi, Jin-Hee Han, Jeong-Woo Lee 0003, Jongpil Kim, Sungik Jun |
Implementation of a TCG-Based Trusted Computing in Mobile Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 18-27, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 191-202, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg |
Unified Architecture for Large-Scale Attested Metering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 115, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Young-Geun Choi, Jeonil Kang, DaeHun Nyang |
Proactive Code Verification Protocol in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 1085-1096, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 438-453, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | He Ge, Stephen R. Tate |
A group signature scheme with signature claiming and variable linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 168-177, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
27 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 73-88, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 41-50, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
18 | David J. Montana, Mark C. Reynolds |
Validation Algorithms for a Secure Internet Routing PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 17-30, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Resource PKI, Internet Routing PKI, Route Origination Attestation, Border Gateway Protocol |
18 | Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han |
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 548-562, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secret information, code attestation, security and system integration, authentication, secret sharing, home network |
Displaying result #1 - #100 of 777 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|