The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TPM with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2004 (16) 2005-2006 (26) 2007 (31) 2008 (51) 2009 (30) 2010 (17) 2011 (18) 2012-2013 (21) 2014 (21) 2015-2016 (19) 2017-2019 (22) 2020-2021 (27) 2022-2023 (17) 2024 (2)
Publication types (Num. hits)
article(68) incollection(4) inproceedings(245) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 179 occurrences of 104 keywords

Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Jianxiong Shao, Dengguo Feng, Yu Qin Type-Based Analysis of Protected Storage in the TPM. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Amin Beheshti, Hamid R. Motahari Nezhad, Boualem Benatallah Temporal Provenance Model (TPM): Model and Query Language Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
20Mark Dermot Ryan Automatic Analysis of Security Properties of the TPM. Search on Bibsonomy INTRUST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Jaebok Shin, Yungu Kim, Wooram Park, Chanik Park DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices. Search on Bibsonomy CloudCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Michael Velten, Frederic Stumpf Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Piljoo Choi, Dong Kyue Kim Design of security enhanced TPM chip against invasive physical attacks. Search on Bibsonomy ISCAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Kuan-Jen Lin, Chin-Yi Wang Using TPM to improve boot security at BIOS layer. Search on Bibsonomy ICCE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Kristin R. Eschenfelder The impact of TPM on research and teaching: the story of the society for automotive engineers digital library. Search on Bibsonomy iConference The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20David Challener TPM. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20 TPM Trusted Platform Module. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle On Using TPM for Secure Identities in Future Home Networks. Search on Bibsonomy Future Internet The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Wooram Park, Chanik Park Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. Search on Bibsonomy J. Comput. Sci. Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Antonio Muñoz 0001, Antonio Maña TPM-based protection for mobile agents. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Zhi-Hua Zhang, Si-Rong Zhang, Wen-Jin Yu, Jianjun Li, Bei Gong, Wei Jiang A Threshold Signature Scheme Based on TPM. Search on Bibsonomy Int. J. Commun. Netw. Syst. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Yumeng Feng, Guangyuan Shi Keep Consistency: A Data Backup and Recovery Mechanism in TPM. Search on Bibsonomy ACIS-ICIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Gina Kounga, Liqun Chen 0002 Enforcing Sticky Policies with TPM and Virtualization. Search on Bibsonomy INTRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Ulrich Greveler, Benjamin Justus, Dennis Löhr Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Steffen Wagner, Christoph Krauß, Claudia Eckert 0001 T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Antonio Muñoz 0001, Antonio Maña Facilitating the Use of TPM Technologies Using the Serenity Framework. Search on Bibsonomy ATC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell, David C. Challener Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper). Search on Bibsonomy TRUST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Hailun Tan, Wen Hu, Sanjay K. Jha A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks. Search on Bibsonomy PM2HW2N@MSWiM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Ponomarev 0001, Nael B. Abu-Ghazaleh TPM-SIM: a framework for performance evaluation of trusted platform modules. Search on Bibsonomy DAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Gook-Pil Roh, Seung-won Hwang TPM: supporting pattern matching queries for road-network trajectory data. Search on Bibsonomy EDBT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Alin Suciu, Tudor Carean Benchmarking the True Random Number Generator of TPM Chips Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
20Russell A. Fink, Alan T. Sherman, Richard Carback Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Ernie Brickell, Jiangtao Li 0001 A Pairing-Based DAA Scheme Further Reducing TPM Resources. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Liqun Chen 0002 A DAA Scheme Requiring Less TPM Resources. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Dawei Zhang, Zhen Han, Guangwen Yan A portable TPM based on USB key. Search on Bibsonomy CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Anna Shubina, Sergey Bratus, Wyllys Ingersol, Sean W. Smith The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris. Search on Bibsonomy STC@CCS The full citation details ... 2010 DBLP  BibTeX  RDF
20Ernie Brickell, Jiangtao Li 0001 A Pairing-Based DAA Scheme Further Reducing TPM Resources. Search on Bibsonomy TRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Li Yan-bo, Liu Song-xian Application of TPM In Site Continuous Improvement. Search on Bibsonomy ICEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Ingo Bente, Jörg Vieweg, Josef von Helden Countering Phishing with TPM-bound Credentials. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel A Formal Analysis of Authentication in the TPM. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Yuqiong Sun, Cheng Song, Mengqian Li Design and Implementation of Dual AIK Signing Scheme in Virtual TPM. Search on Bibsonomy PAAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Antonio Muñoz 0001, Antonio Maña, Daniel Serrano Protecting agents from malicious hosts using TPM. Search on Bibsonomy Int. J. Comput. Sci. Appl. The full citation details ... 2009 DBLP  BibTeX  RDF
20Russell A. Fink, Alan T. Sherman, Richard Carback TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Liqun Chen 0002 A DAA Scheme Requiring Less TPM Resources. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Zhen-Long Du, Xiaoli Li 0005, Kangkang Shen Trusted Firmware Services Based on TPM. Search on Bibsonomy INTRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang 0002, Zhiyong Shan Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. Search on Bibsonomy MASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Wei Ou, Xiaofeng Wang 0002, Wenbao Han, Yongjun Wang Research on Trust Evaluation Model Based on TPM. Search on Bibsonomy FCST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Gong Bei, Shi Guangyuan An Anonymous Attestation Scheme of TPM. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Liqun Chen 0002, Mark Ryan 0001 Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Gilles Guette, Olivier Heen A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. Search on Bibsonomy VNC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xiaofeng Chen 0004, Dengguo Feng Direct Anonymous Attestation for Next Generation TPM. Search on Bibsonomy J. Comput. The full citation details ... 2008 DBLP  BibTeX  RDF
20Wenbo Mao TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Haibo Chen 0001, Jun Li, Wenbo Mao TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Carolin Latze, Ulrich Ultes-Nitsche A Proof-of-Concept Implementation of EAP-TLS with TPM Support. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
20A. P. Kedar, R. R. Lakhe, V. S. Deshpande, P. V. Washimkar, M. V. Wakhare A Comparative Review of TQM, TPM and Related Organisational Performance Improvement Programs. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Xiaoping Wu, Zhi-Dong Shen, Huanguo Zhang Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Yuri Demchenko, Leon Gommans, Cees de Laat Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment. Search on Bibsonomy CTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos Secure web service federation management using tpm virtualisation. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF membership management, security, web services, trusted computing, federation
20Rajiv Kumar Sharma, Dinesh Kumar, Pradeep Kumar Manufacturing excellence through TPM implementation: a practical analysis. Search on Bibsonomy Ind. Manag. Data Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jan Camenisch Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Bernhard Weiss TPM Enterprise Key Management requires centralized Hardware-based Security. Search on Bibsonomy ISSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Lucy Cradduck, Adrian McCullagh Designing Copyright TPM : A Mutant Digital Copyright. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jiangchun Ren, Kui Dai, Zhiying Wang 0003, Xue-mi Zhao, Yuan-man Tong Design and Implementation a TPM Chip SUP320 by SOC. Search on Bibsonomy SEC The full citation details ... 2005 DBLP  BibTeX  RDF
20Lotfi A. Zadeh Fuzzy Logic as a Basis for Theory of Precisiation of Meaning (TPM). Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2005 DBLP  BibTeX  RDF
20John M. Sharp, Zahir Irani, K. Kutucuoglu, Fehmi Erzincanli Integrating TQM and TPM into a management information system. Search on Bibsonomy Int. J. Inf. Technol. Manag. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Mike Brayshaw The Legacy of TPM. Search on Bibsonomy PPIG The full citation details ... 1989 DBLP  BibTeX  RDF
20Marc Eisenstadt, Mike Brayshaw The Transparent Prolog Machine (TPM): An Execution Model and Graphical Debugger for Logic Programming. Search on Bibsonomy J. Log. Program. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Mike Brayshaw, Marc Eisenstadt Adding Data and Procedure Abstraction to the Transparent Prolog Machine TPM. Search on Bibsonomy ICLP/SLP The full citation details ... 1988 DBLP  BibTeX  RDF
20Hans-Jürgen Böhm, Ulrich Kretschmer, Werner Prautsch, Gerhard Winterer TPM - Ein Simulationsmodell für den Güterverkehr der Deutschen Bundesbahn. Search on Bibsonomy Simulationstechnik The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Marc Eisenstadt, Mike Brayshaw Graphical Debugging with the Transparent PROLOG Machine (TPM). Search on Bibsonomy IJCAI The full citation details ... 1987 DBLP  BibTeX  RDF
13Muhammad Asim Jamshed, Wonho Kim, KyoungSoo Park Suppressing bot traffic with accurate human attestation. Search on Bibsonomy ApSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bot traffic suppression, human attestation, networked system security, trusted computing
13René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan A practical property-based bootstrap architecture. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot
13Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala On-board credentials with open provisioning. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provisioning protocols, trusted computing, credentials, secure hardware
13Zhen Yang 0004, Kefeng Fan, Yingxu Lai Trusted Computing Based Mobile DRM Authentication Scheme. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Overs secFleck: A Public Key Technology Platform for Wireless Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Yu Qin, Dengguo Feng, Zhen Xu An Anonymous Property-Based Attestation Protocol from Bilinear Maps. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Nicolai Kuntze, Andreas Fuchs 0002, Carsten Rudolph Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai A Novel Server-Based Application Execution Architecture. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Michael LeMay, Carl A. Gunter Cumulative Attestation Kernels for Embedded Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Gergely Tóth, Gábor Koszegi, Zoltán Hornák Case study: automated security testing on the trusted computing platform. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Flinder, OpenTC, automated security testing, trusted computing
13Jian He, Mingdi Xu Research on Storage Security Based on Trusted Computing Platform. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas The Trusted Execution Module: Commodity General-Purpose Trusted Computing. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Guoheng Wei, Xueguang Zhou, Huanguo Zhang A Trusted Computing Model Based on Code Authorization. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code authorization, virtual security units, informaion information, trusted computing
13Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Changping Liu, Yong Feng, Mingyu Fan, Guangwei Wang PKI Mesh Trust Model Based on Trusted Computing. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki Using Boot Control to Preserve the Integrity of Evidence. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evidence integrity, hysteresis signatures, boot control
13Zhifeng Bao, Tok Wang Ling, Jiaheng Lu, Bo Chen SemanticTwig: A Semantic Approach to Optimize XML Query Processing. Search on Bibsonomy DASFAA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi Property-Based Attestation without a Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy
13Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler 0002 Towards Trust Services for Language-Based Virtual Machines for Grid Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 A New Direct Anonymous Attestation Scheme from Bilinear Maps. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module
13Paul England Practical Techniques for Operating System Attestation. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security distributed systems, trusted computing, security models, attestation
13José Carlos Brustoloni, David Kyle Updates and Asynchronous Communication in Trusted Computing Systems. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Patrick P. Tsang, Sean W. Smith Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Dongbo Wang, Ai-Min Wang Trust Maintenance Toward Virtual Computing Environment in the Grid Service. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust Attestation, trusted loading, virtual machine, virtual computing environment
13Yingwei Luo, Binbin Zhang, Xiaolin Wang 0001, Zhenlin Wang, Yifeng Sun, Haogang Chen 0002 Live and incremental whole-system migration of virtual machines using block-bitmap. Search on Bibsonomy CLUSTER The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Segla Kpodjedo, Samuel Pierre, Makan Pourzandi Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 Improving Xen security through disaggregation. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing base, disaggregation
13Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter Policy enforcement and compliance proofs for Xen virtual machines. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing, integrity management
13Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens Trust management for trusted computing platforms in web services. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web services, trusted computing, properties, attestation
13Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
13Carsten Rudolph Covert Identity Information in Direct Anonymous Attestation (DAA). Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Frédéric Amiel, Benoit Feix, Karine Villegas Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation
13Surya Nepal, John Zic, Hon Hwang, David Moreland Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan PEI models towards scalable, usable and high-assurance information sharing. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PEI, slient-side access control, information sharing, trusted computing, high-assurance
13He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
13Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 An Approach to a Trustworthy System Architecture Using Virtualization. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 318 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license