The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for trusted with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1985 (19) 1986-1988 (18) 1989 (15) 1990 (23) 1991-1992 (35) 1993 (18) 1994 (24) 1995 (18) 1996 (32) 1997 (34) 1998 (39) 1999 (50) 2000 (71) 2001 (121) 2002 (93) 2003 (146) 2004 (226) 2005 (302) 2006 (422) 2007 (444) 2008 (509) 2009 (381) 2010 (350) 2011 (258) 2012 (340) 2013 (354) 2014 (339) 2015 (477) 2016 (306) 2017 (479) 2018 (522) 2019 (547) 2020 (263) 2021 (378) 2022 (661) 2023 (326) 2024 (62)
Publication types (Num. hits)
article(1615) book(7) incollection(82) inproceedings(6888) phdthesis(63) proceedings(47)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3146 occurrences of 1350 keywords

Results
Found 8702 publication records. Showing 8702 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
113Jing Zhan, Huanguo Zhang, Fei Yan Building Trusted Sub-domain for the Grid with Trusted Computing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security
92Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
83Dries Schellekens, Pim Tuyls, Bart Preneel Embedded Trusted Computing with Authenticated Non-volatile Memory. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72David Kyle, José Carlos Brustoloni Uclinux: a linux security module for trusted-computing-based usage controls enforcement. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG
71Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner A PrivacyCA for Anonymity and Trust. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base
71Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan Beyond secure channels. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack
70Kurt Dietrich An integrated architecture for trusted computing for java enabled embedded devices. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF java 2 microedition, mobile trusted module, trusted computing, J2ME, mobile security
70Ravi S. Sandhu, Xinwen Zhang Peer-to-peer access control architecture using trusted computing technology. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, trusted computing, security architecture, policy enforcement
69Johannes Winter Trusted computing building blocks for embedded linux-based ARM trustzone platforms. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF arm trustzone, mobile trusted computing, linux, virtualisation
69Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens Trust management for trusted computing platforms in web services. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web services, trusted computing, properties, attestation
64Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf Reconfigurable trusted computing in hardware. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF field programmable gate array (FPGA), trusted computing, trusted platform module (TPM)
64Mike Burmester, Judie Mulholland The advent of trusted computing: implications for digital forensics. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery
64Boris Balacheff, Liqun Chen 0002, David Plaquin, Graeme Proudler A trusted process to digitally sign a document. Search on Bibsonomy NSPW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF TCPA, authenticated image, trusted display, digital signatures, smart card
61Shuyi Chen, Yingyou Wen, Hong Zhao Formal Analysis of Secure Bootstrap in Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Guoheng Wei, Xueguang Zhou, Huanguo Zhang A Trusted Computing Model Based on Code Authorization. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code authorization, virtual security units, informaion information, trusted computing
58Farookh Khadeer Hussain, Elizabeth Chang 0001, Tharam S. Dillon Trustworthiness Measurement Methodology for e-Business. Search on Bibsonomy Advances in Web Intelligence and Data Mining The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Ronald Toegl, Thomas Winkler 0002, Mohammad Nauman, Theodore W. Hong Towards platform-independent trusted computing. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF jsr 321, java, trusted computing
57Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution
54René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan A practical property-based bootstrap architecture. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot
54Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo Layering negotiations for flexible attestation. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed coalition, trusted virtual domains, trusted computing, remote attestation
53Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi An efficient implementation of trusted channels based on openssl. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation
53Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble Flexible and secure enterprise rights management based on trusted virtual domains. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing
52Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad Protectit: trusted distributed services operating on sensitive data. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic interception, trusted data path, data protection
51Leendert van Doorn Trusted computing challenges. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted computing
50Zhidong Shen, Qiang Tong A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. Search on Bibsonomy HIS (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trusted computing technology, trusted computing platform, trusted platfrom module, security, mobile Agent
49Alexander Böttcher, Bernhard Kauer, Hermann Härtig Trusted Computing Serving an Anonymity Service. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Paul England, Talha Tariq Towards a Programmable TPM. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trusted Platforms, Secure Execution, Smart Cards, Trusted Platform Module
48Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 Trusted declassification: : high-level policy for a security-typed language. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification
45Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Erkut Sinan Ayla, Attila Ozgit An architecture for end-to-end and inter-domain trusted mail delivery service. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Santosh K. Shrivastava Satem: Trusted Service Code Execution across Transactions. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Gang Xu, Cristian Borcea, Liviu Iftode Satem: Trusted Service Code Execution across Transactions. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Jan Camenisch Better Privacy for Trusted Computing Platforms: (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Ingemar Ingemarsson, Gustavus J. Simmons A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
45Sebastian Zickau, Mathias Slawik, Dirk Thatmann, Sebastian Uhlig, Iwailo Denisow, Axel Küpper TRESOR - Towards the Realization of a Trusted Cloud Ecosystem. Search on Bibsonomy Trusted Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
45Lorena González-Manzano, Gerd Brost, Matthias Aumüller An Architecture for Trusted PaaS Cloud Computing for Personal Data. Search on Bibsonomy Trusted Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
45Klaus Kursawe, Dries Schellekens Flexible muTPMs through disembedding. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module, secure coprocessor, trusted computing, trusted platform module
44Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas The Trusted Execution Module: Commodity General-Purpose Trusted Computing. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang A New Data Protecting Scheme Based on TPM. Search on Bibsonomy SNPD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted platform model (TPM), storage protocol, trusted firmware
43Mario Strasser, Heiko Stamer A Software-Based Trusted Platform Module Emulator. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Jan-Erik Ekberg, Sven Bugiel Trust in a small package: minimized MRTM software implementation for mobile secure environments. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module, platform security, mobile phones, trusted computing, secure hardware
42Premkumar T. Devanbu, Stuart G. Stubblebine Research Directions for Automated Software Verification: Using Trusted Hardware. Search on Bibsonomy ASE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF automated software verification, trusted hardware, content providers, hosted software, networked software, hosting computer, physically secure computing device, embedded certified private key, executable binary, trusted signature, scientific goals, engineering goals, testing, software agents, program verification, browsers, version control, servers, service providers, applets, checks
42Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas Offline count-limited certificates. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF offline payments, authentication, smartcards, trusted platform module (TPM)
41Hao Wen, Zhengfu Han, Yibo Zhao, Guangcan Guo, Peilin Hong Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF quantum network, trusted relay, security, stochastic, quantum key distribution
41Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa Encryption over Semi-trusted Database. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography
41Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan TVDc: managing security in the trusted virtual datacenter. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control
41Lingli Deng, Yeping He, Ziyao Xu Trusted Reputation Management Service for Peer-to-Peer Collaboration. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data integrity, virtual machine, P2P, trusted computing, reputation management
41Hai Jin 0001, Chuanjiang Yi CMM: Credential migration management system based on trusted computing in CGSP. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credential migration, ChinaGrid, Daonity, grid computing, trusted computing
41Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov A framework for trusted instruction execution via basic block signature verification. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF trusted execution, intrusion detection, computer security
41Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh Terra: a virtual machine-based platform for trusted computing. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM
41Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto Privacy and Trusted Computing. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCPA, privacy, Trusted computing
40William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang 0002 Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF On-line Social Networks, Trusted Environment, Predators, Privacy, Cloud Service
40Kurt Dietrich, Johannes Winter Implementation Aspects of Mobile and Embedded Trusted Computing. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile Trusted Computing, MTMs, ARM TrustZone, Secure Element, JavaCard
40Shane Balfe, Kenneth G. Paterson e-EMV: emulating EMV for internet payments with trusted computing technologies. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF card not present, trusted computing, EMV
40Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 A New Direct Anonymous Attestation Scheme from Bilinear Maps. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module
40Geoffrey Strongin The role of trusted computing in internet scale DRM. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XDI, XRI, digital rights management, trusted computing, attestation, data interchange
39Mohammad Torabi Dashti Optimistic Fair Exchange Using Trusted Devices. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 A System Architecture for Reconfigurable Trusted Platforms. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Fan He, Huanguo Zhang, Mei Tang A Test Method of Trusted Computing Supporting Software. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Chen Li, Ye Zhang, Lijuan Duan Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Fred B. Schneider Trusted Computing in Context. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha Energy and execution time analysis of a software-based trusted platform module. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya An Approach of Trusted Program Generation for User-Responsible Privacy. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Arindam Mitra, Muthucumaru Maheswaran Impact of Peer Churning in Trusted Gossiping for P2P Information Sharing. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi Trusted-link: web-link enhancement for integrity and trustworthiness. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity, web, signature, link, trustworthiness
39Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang Grid System Integrated with Trusted Computing Platform. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Yuh-Jong Hu Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF agent-oriented PKI, agent-mediated e-commerce (AMEC), agent trust and delegation, FIPA standards, digital certificate
39Mark Aldrich Secured Systems and Ada: A Trusted System Software Architecture. Search on Bibsonomy TRI-Ada The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Ada
39Rein Turn Private sector needs for trusted/secure computer systems. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
38Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Steffen Schulz 0001, Ahmad-Reza Sadeghi Secure VPNs for Trusted Computing Environments. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Deqing Zou, Yunfa Li 0001, Song Wu 0001, Weizhong Qiang A Trusted Group Signature Architecture in Virtual Computing Environment. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler 0002 Towards Trust Services for Language-Based Virtual Machines for Grid Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Xiaolin Li 0001, Hui Kang, Patrick Harrington, Johnson Thomas Autonomic and Trusted Computing Paradigms. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi Secure storage using a sealing proxy. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trusted computing, trusted platform module (TPM), sealing
37Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle
37Ming Qu, Shufen Liu A Framework of Constructing and Evolving Trusted Services with Formulation. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Trusted Service, Service Trustiness, Sub-Ontology Evolution, Service Computing, Trusted Ontology
37Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya The System Integrity Verification for Trusted RFID Protocol. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification
36Frederic Stumpf, Claudia Eckert 0001, Shane Balfe Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation
36Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 Improving Xen security through disaggregation. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing base, disaggregation
36Xiaofei Zhang, Fang Xu, Yi Liu, Xing Zhang, Changxiang Shen Trust Extended Dynamic Security Model and Its Application in Network. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reliability, Access control, Measurement, Trusted computing, Security model
36Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth Reducing TCB complexity for security-sensitive applications: three case studies. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trusted computing base, application security
36Silvio Micali Simple and fast optimistic protocols for fair electronic exchange. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF invisible trusted parties, fair exchange, Optimistic Protocols, contract signing, certified e-mail
35Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
35Loïc Duflot, Olivier Levillain, Benjamin Morin ACPI: Design Principles and Concerns. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ACPI, trusted platforms, rootkits
35Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. Search on Bibsonomy ADHOC-NOW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Friend Mechanism, Trusted Community, MANET
35Yanjiang Yang, Yingjiu Li, Robert H. Deng New Paradigm of Inference Control with Trusted Computing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocol, trusted computing, auditing, Inference control
35ZhenLiu Zhou, RongSheng Xu BIOS Security Analysis and a Kind of Trusted BIOS. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust Measurement, BIOS, UEFI, Trusted Computing, TPM
35Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble Realizing property-based attestation and sealing with commonly available hard- and software. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF property-based attestation, property-based sealing, trusted computing
35Andrew Cooper, Andrew P. Martin Towards an open, trusted digital rights management platform. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, digital rights management, trusted computing, DRM, mandatory access controls
35Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy TCG inside?: a note on TPM specification compliance. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF test, trusted computing, compliance, TPM
35Rolf Oppliger, Ruedi Rytz Does Trusted Computing Remedy Computer Security Problems? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software-open computer systems, software-closed computer systems, software-controlled computer systems, digital rights management, Trusted Computing
35Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
35Joost-Pieter Katoen, Rom Langerak, Arend Rensink (eds.) ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday Search on Bibsonomy ModelEd, TestEd, TrustEd The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Stefano Schivo, Rom Langerak Discretization of Continuous Dynamical Systems Using UPPAAL. Search on Bibsonomy ModelEd, TestEd, TrustEd The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jan Friso Groote, Erik P. de Vink Problem Solving Using Process Algebra Considered Insightful. Search on Bibsonomy ModelEd, TestEd, TrustEd The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Arjan van der Schaft Analysis and Design of Interconnected Systems: A Systems and Control Perspective. Search on Bibsonomy ModelEd, TestEd, TrustEd The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 8702 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license