|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3146 occurrences of 1350 keywords
|
|
|
Results
Found 8702 publication records. Showing 8702 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 463-471, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
92 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 7-14, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
83 | Dries Schellekens, Pim Tuyls, Bart Preneel |
Embedded Trusted Computing with Authenticated Non-volatile Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 60-74, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 63-70, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
71 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 101-119, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
71 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan |
Beyond secure channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 30-40, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack |
70 | Kurt Dietrich |
An integrated architecture for trusted computing for java enabled embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 2-6, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
java 2 microedition, mobile trusted module, trusted computing, J2ME, mobile security |
70 | Ravi S. Sandhu, Xinwen Zhang |
Peer-to-peer access control architecture using trusted computing technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 147-158, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, trusted computing, security architecture, policy enforcement |
69 | Johannes Winter |
Trusted computing building blocks for embedded linux-based ARM trustzone platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-30, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
arm trustzone, mobile trusted computing, linux, virtualisation |
69 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
Trust management for trusted computing platforms in web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 58-62, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
web services, trusted computing, properties, attestation |
64 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 15-20, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
64 | Mike Burmester, Judie Mulholland |
The advent of trusted computing: implications for digital forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 283-287, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery |
64 | Boris Balacheff, Liqun Chen 0002, David Plaquin, Graeme Proudler |
A trusted process to digitally sign a document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001, pp. 79-86, 2001, ACM, 1-58113-457-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
TCPA, authenticated image, trusted display, digital signatures, smart card |
61 | Shuyi Chen, Yingyou Wen, Hong Zhao |
Formal Analysis of Secure Bootstrap in Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 352-360, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Guoheng Wei, Xueguang Zhou, Huanguo Zhang |
A Trusted Computing Model Based on Code Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 495-499, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
code authorization, virtual security units, informaion information, trusted computing |
58 | Farookh Khadeer Hussain, Elizabeth Chang 0001, Tharam S. Dillon |
Trustworthiness Measurement Methodology for e-Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Web Intelligence and Data Mining ![In: Advances in Web Intelligence and Data Mining, pp. 21-30, 2006, Springer, 978-3-540-33879-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Ronald Toegl, Thomas Winkler 0002, Mohammad Nauman, Theodore W. Hong |
Towards platform-independent trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 61-66, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
jsr 321, java, trusted computing |
57 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 27-42, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
54 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 29-38, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
54 | Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo |
Layering negotiations for flexible attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 17-20, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed coalition, trusted virtual domains, trusted computing, remote attestation |
53 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 41-50, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
53 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
52 | Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad |
Protectit: trusted distributed services operating on sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 137-147, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
traffic interception, trusted data path, data protection |
51 | Leendert van Doorn |
Trusted computing challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 1, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
50 | Zhidong Shen, Qiang Tong |
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (3) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 46-50, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trusted computing technology, trusted computing platform, trusted platfrom module, security, mobile Agent |
49 | Alexander Böttcher, Bernhard Kauer, Hermann Härtig |
Trusted Computing Serving an Anonymity Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 143-154, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Paul England, Talha Tariq |
Towards a Programmable TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 1-13, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trusted Platforms, Secure Execution, Smart Cards, Trusted Platform Module |
48 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 |
Trusted declassification: : high-level policy for a security-typed language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 65-74, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification |
45 | Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang |
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 89-93, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 220-225, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Santosh K. Shrivastava |
Satem: Trusted Service Code Execution across Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 337-338, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Gang Xu, Cristian Borcea, Liviu Iftode |
Satem: Trusted Service Code Execution across Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 321-336, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 73-88, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Ingemar Ingemarsson, Gustavus J. Simmons |
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 266-282, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
45 | Sebastian Zickau, Mathias Slawik, Dirk Thatmann, Sebastian Uhlig, Iwailo Denisow, Axel Küpper |
TRESOR - Towards the Realization of a Trusted Cloud Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trusted Cloud Computing ![In: Trusted Cloud Computing, pp. 141-157, 2014, Springer, 978-3-319-12717-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
45 | Lorena González-Manzano, Gerd Brost, Matthias Aumüller |
An Architecture for Trusted PaaS Cloud Computing for Personal Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trusted Cloud Computing ![In: Trusted Cloud Computing, pp. 239-258, 2014, Springer, 978-3-319-12717-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
45 | Klaus Kursawe, Dries Schellekens |
Flexible muTPMs through disembedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 116-124, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, secure coprocessor, trusted computing, trusted platform module |
44 | Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy |
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 45-62, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas |
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 133-148, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang |
A New Data Protecting Scheme Based on TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 943-947, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trusted platform model (TPM), storage protocol, trusted firmware |
43 | Mario Strasser, Heiko Stamer |
A Software-Based Trusted Platform Module Emulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 33-47, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jan-Erik Ekberg, Sven Bugiel |
Trust in a small package: minimized MRTM software implementation for mobile secure environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 9-18, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, platform security, mobile phones, trusted computing, secure hardware |
42 | Premkumar T. Devanbu, Stuart G. Stubblebine |
Research Directions for Automated Software Verification: Using Trusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 1997 International Conference on Automated Software Engineering, ASE 1997, Lake Tahoe, CA, USA, November 2-5, 1997, pp. 274-279, 1997, IEEE Computer Society, 0-8186-7961-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
automated software verification, trusted hardware, content providers, hosted software, networked software, hosting computer, physically secure computing device, embedded certified private key, executable binary, trusted signature, scientific goals, engineering goals, testing, software agents, program verification, browsers, version control, servers, service providers, applets, checks |
42 | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas |
Offline count-limited certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2145-2152, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
offline payments, authentication, smartcards, trusted platform module (TPM) |
41 | Hao Wen, Zhengfu Han, Yibo Zhao, Guangcan Guo, Peilin Hong |
Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(1), pp. 18-22, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
quantum network, trusted relay, security, stochastic, quantum key distribution |
41 | Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa |
Encryption over Semi-trusted Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA Workshops ![In: Database Systems for Advanced Applications, DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD, Brisbane, Australia, April 20-23, 2009, pp. 358-362, 2009, Springer, 978-3-642-04204-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography |
41 | Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan |
TVDc: managing security in the trusted virtual datacenter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 42(1), pp. 40-47, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control |
41 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II, pp. 1069-1086, 2008, Springer, 978-3-540-88872-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
41 | Hai Jin 0001, Chuanjiang Yi |
CMM: Credential migration management system based on trusted computing in CGSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 1(2), pp. 200-207, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credential migration, ChinaGrid, Daonity, grid computing, trusted computing |
41 | Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov |
A framework for trusted instruction execution via basic block signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 191-196, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted execution, intrusion detection, computer security |
41 | Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh |
Terra: a virtual machine-based platform for trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 193-206, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM |
41 | Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto |
Privacy and Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 383-388, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TCPA, privacy, Trusted computing |
40 | William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang 0002 |
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings, pp. 561-569, 2009, Springer, 978-3-642-03416-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
On-line Social Networks, Trusted Environment, Predators, Privacy, Cloud Service |
40 | Kurt Dietrich, Johannes Winter |
Implementation Aspects of Mobile and Embedded Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 29-44, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mobile Trusted Computing, MTMs, ARM TrustZone, Secure Element, JavaCard |
40 | Shane Balfe, Kenneth G. Paterson |
e-EMV: emulating EMV for internet payments with trusted computing technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 81-92, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
card not present, trusted computing, EMV |
40 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 166-178, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
40 | Geoffrey Strongin |
The role of trusted computing in internet scale DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 25-26, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XDI, XRI, digital rights management, trusted computing, attestation, data interchange |
39 | Mohammad Torabi Dashti |
Optimistic Fair Exchange Using Trusted Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 711-725, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 |
A System Architecture for Reconfigurable Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 541-544, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Fan He, Huanguo Zhang, Mei Tang |
A Test Method of Trusted Computing Supporting Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2330-2334, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Chen Li, Ye Zhang, Lijuan Duan |
Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 639-644, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Fred B. Schneider |
Trusted Computing in Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 4-5, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Energy and execution time analysis of a software-based trusted platform module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1128-1133, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya |
An Approach of Trusted Program Generation for User-Responsible Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 1159-1170, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Arindam Mitra, Muthucumaru Maheswaran |
Impact of Peer Churning in Trusted Gossiping for P2P Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 31, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 17-24, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
39 | Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang |
Grid System Integrated with Trusted Computing Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (1) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 1, pp. 619-625, 2006, IEEE Computer Society, 0-7695-2581-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Yuh-Jong Hu |
Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 3(3-4), pp. 221-243, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
agent-oriented PKI, agent-mediated e-commerce (AMEC), agent trust and delegation, FIPA standards, digital certificate |
39 | Mark Aldrich |
Secured Systems and Ada: A Trusted System Software Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRI-Ada ![In: Proceedings of the 1994 Conference on TRI-Ada 1994, November 6-11, 1994, Baltimore, Maryland, USA., pp. 282-292, 1994, ACM, 0-89791-666-2. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Ada |
39 | Rein Turn |
Private sector needs for trusted/secure computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1982 National Computer Conference, 7-10 June, 1982, Houston, Texas, USA, pp. 449-460, 1982, AFIPS Press, 0-88283-035-X. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
38 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 134-148, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Steffen Schulz 0001, Ahmad-Reza Sadeghi |
Secure VPNs for Trusted Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 197-216, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Deqing Zou, Yunfa Li 0001, Song Wu 0001, Weizhong Qiang |
A Trusted Group Signature Architecture in Virtual Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 73-85, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler 0002 |
Towards Trust Services for Language-Based Virtual Machines for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 48-59, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 410-419, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Xiaolin Li 0001, Hui Kang, Patrick Harrington, Johnson Thomas |
Autonomic and Trusted Computing Paradigms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 143-152, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 265-279, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi |
Secure storage using a sealing proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 27-34, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, trusted platform module (TPM), sealing |
37 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 75-91, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
37 | Ming Qu, Shufen Liu |
A Framework of Constructing and Evolving Trusted Services with Formulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCST ![In: Fifth International Conference on Frontier of Computer Science and Technology, FCST 2010, Changchun, Jilin Province, China, August 18-22, 2010, pp. 392-397, 2010, IEEE Computer Society, 978-0-7695-4139-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Trusted Service, Service Trustiness, Sub-Ontology Evolution, Service Computing, Trusted Ontology |
37 | Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya |
The System Integrity Verification for Trusted RFID Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 743-747, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification |
36 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 376-382, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
36 | Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 |
Improving Xen security through disaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 151-160, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing base, disaggregation |
36 | Xiaofei Zhang, Fang Xu, Yi Liu, Xing Zhang, Changxiang Shen |
Trust Extended Dynamic Security Model and Its Application in Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 404-415, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Reliability, Access control, Measurement, Trusted computing, Security model |
36 | Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth |
Reducing TCB complexity for security-sensitive applications: three case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 161-174, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trusted computing base, application security |
36 | Silvio Micali |
Simple and fast optimistic protocols for fair electronic exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003, pp. 12-19, 2003, ACM, 1-58113-708-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
invisible trusted parties, fair exchange, Optimistic Protocols, contract signing, certified e-mail |
35 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
35 | Loïc Duflot, Olivier Levillain, Benjamin Morin |
ACPI: Design Principles and Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 14-28, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ACPI, trusted platforms, rootkits |
35 | Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke |
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings, pp. 129-141, 2007, Springer, 978-3-540-74822-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Friend Mechanism, Trusted Community, MANET |
35 | Yanjiang Yang, Yingjiu Li, Robert H. Deng |
New Paradigm of Inference Control with Trusted Computing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 243-258, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security protocol, trusted computing, auditing, Inference control |
35 | ZhenLiu Zhou, RongSheng Xu |
BIOS Security Analysis and a Kind of Trusted BIOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 427-437, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust Measurement, BIOS, UEFI, Trusted Computing, TPM |
35 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 50-57, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
35 | Andrew Cooper, Andrew P. Martin |
Towards an open, trusted digital rights management platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 79-88, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, digital rights management, trusted computing, DRM, mandatory access controls |
35 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 47-56, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
35 | Rolf Oppliger, Ruedi Rytz |
Does Trusted Computing Remedy Computer Security Problems? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(2), pp. 16-19, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software-open computer systems, software-closed computer systems, software-controlled computer systems, digital rights management, Trusted Computing |
35 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 221-226, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
35 | Joost-Pieter Katoen, Rom Langerak, Arend Rensink (eds.) |
ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday ![Search on Bibsonomy](Pics/bibsonomy.png) |
ModelEd, TestEd, TrustEd ![Springer, 978-3-319-68269-3 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Stefano Schivo, Rom Langerak |
Discretization of Continuous Dynamical Systems Using UPPAAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ModelEd, TestEd, TrustEd ![In: ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday, pp. 297-315, 2017, Springer, 978-3-319-68269-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Jan Friso Groote, Erik P. de Vink |
Problem Solving Using Process Algebra Considered Insightful. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ModelEd, TestEd, TrustEd ![In: ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday, pp. 48-63, 2017, Springer, 978-3-319-68269-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Arjan van der Schaft |
Analysis and Design of Interconnected Systems: A Systems and Control Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ModelEd, TestEd, TrustEd ![In: ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday, pp. 316-332, 2017, Springer, 978-3-319-68269-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 8702 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|