The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase trusted computing (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2000 (18) 2001-2003 (26) 2004 (23) 2005 (38) 2006 (125) 2007 (136) 2008 (159) 2009 (100) 2010 (175) 2011 (125) 2012 (167) 2013 (115) 2014 (149) 2015 (325) 2016 (170) 2017-2018 (345) 2019 (2)
Publication types (Num. hits)
article(98) book(2) incollection(12) inproceedings(2057) phdthesis(7) proceedings(22)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 705 occurrences of 362 keywords

Results
Found 2198 publication records. Showing 2198 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
108Dries Schellekens, Pim Tuyls, Bart Preneel Embedded Trusted Computing with Authenticated Non-volatile Memory. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
93Johannes Winter Trusted computing building blocks for embedded linux-based ARM trustzone platforms. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF arm trustzone, mobile trusted computing, linux, virtualisation
92Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner A PrivacyCA for Anonymity and Trust. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base
90Jing Zhan, Huanguo Zhang, Fei Yan Building Trusted Sub-domain for the Grid with Trusted Computing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security
90Ravi S. Sandhu, Xinwen Zhang Peer-to-peer access control architecture using trusted computing technology. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, trusted computing, security architecture, policy enforcement
86Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens Trust management for trusted computing platforms in web services. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web services, trusted computing, properties, attestation
83Mike Burmester, Judie Mulholland The advent of trusted computing: implications for digital forensics. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery
81Shuyi Chen, Yingyou Wen, Hong Zhao Formal Analysis of Secure Bootstrap in Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
80Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
78Ronald Toegl, Thomas Winkler 0002, Mohammad Nauman, Theodore W. Hong Towards platform-independent trusted computing. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF jsr 321, java, trusted computing
77David Kyle, José Carlos Brustoloni Uclinux: a linux security module for trusted-computing-based usage controls enforcement. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG
77Guoheng Wei, Xueguang Zhou, Huanguo Zhang A Trusted Computing Model Based on Code Authorization. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code authorization, virtual security units, informaion information, trusted computing
77Kurt Dietrich An integrated architecture for trusted computing for java enabled embedded devices. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF java 2 microedition, mobile trusted module, trusted computing, J2ME, mobile security
73Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan Beyond secure channels. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack
72Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf Reconfigurable trusted computing in hardware. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF field programmable gate array (FPGA), trusted computing, trusted platform module (TPM)
68Leendert van Doorn Trusted computing challenges. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted computing
68Alexander Böttcher, Bernhard Kauer, Hermann Härtig Trusted Computing Serving an Anonymity Service. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Gary Grider, James Nunez, John Bent, Steve Poole, Robert B. Ross, Evan Felix Coordinating government funding of file system and I/O research through the high end computing university research activity. Search on Bibsonomy Operating Systems Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Hai Jin 0001, Chuanjiang Yi CMM: Credential migration management system based on trusted computing in CGSP. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credential migration, ChinaGrid, Daonity, grid computing, trusted computing
57Xiaolin Li 0001, Hui Kang, Patrick Harrington, Johnson Thomas Autonomic and Trusted Computing Paradigms. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Jan Camenisch Better Privacy for Trusted Computing Platforms: (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto Privacy and Trusted Computing. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCPA, privacy, Trusted computing
55Fan He, Huanguo Zhang, Mei Tang A Test Method of Trusted Computing Supporting Software. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh Terra: a virtual machine-based platform for trusted computing. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM
54Shane Balfe, Kenneth G. Paterson e-EMV: emulating EMV for internet payments with trusted computing technologies. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF card not present, trusted computing, EMV
54Geoffrey Strongin The role of trusted computing in internet scale DRM. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XDI, XRI, digital rights management, trusted computing, attestation, data interchange
53Fred B. Schneider Trusted Computing in Context. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang Grid System Integrated with Trusted Computing Platform. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas The Trusted Execution Module: Commodity General-Purpose Trusted Computing. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan A practical property-based bootstrap architecture. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot
51Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler 0002 Towards Trust Services for Language-Based Virtual Machines for Grid Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Steffen Schulz 0001, Ahmad-Reza Sadeghi Secure VPNs for Trusted Computing Environments. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Zhidong Shen, Qiang Tong A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. Search on Bibsonomy HIS (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trusted computing technology, trusted computing platform, trusted platfrom module, security, mobile Agent
48Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
48Yanjiang Yang, Yingjiu Li, Robert H. Deng New Paradigm of Inference Control with Trusted Computing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocol, trusted computing, auditing, Inference control
48Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble Realizing property-based attestation and sealing with commonly available hard- and software. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF property-based attestation, property-based sealing, trusted computing
48Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy TCG inside?: a note on TPM specification compliance. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF test, trusted computing, compliance, TPM
48Rolf Oppliger, Ruedi Rytz Does Trusted Computing Remedy Computer Security Problems? Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software-open computer systems, software-closed computer systems, software-controlled computer systems, digital rights management, Trusted Computing
47Ahmad-Reza Sadeghi Trusted Computing - Special Aspects and Challenges. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Kurt Dietrich, Martin Pirker, Tobias Vejda, Ronald Toegl, Thomas Winkler 0002, Peter Lipp A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Wenbo Mao, Fei Yan, Chunrun Chen Daonity: grid security with behaviour conformity from trusted computing. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Xinmao Gai, Yong Li, Yasha Chen, Changxiang Shen Formal Definitions for Trust in Trusted Computing. Search on Bibsonomy UIC/ATC Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
46Derek Gordon Murray, Grzegorz Milos, Steven Hand Improving Xen security through disaggregation. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing base, disaggregation
46Frederic Stumpf, Claudia Eckert 0001, Shane Balfe Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation
46Xiaofei Zhang, Fang Xu, Yi Liu, Xing Zhang, Changxiang Shen Trust Extended Dynamic Security Model and Its Application in Network. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reliability, Access control, Measurement, Trusted computing, Security model
46Kurt Dietrich, Johannes Winter Implementation Aspects of Mobile and Embedded Trusted Computing. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile Trusted Computing, MTMs, ARM TrustZone, Secure Element, JavaCard
46Paul England Practical Techniques for Operating System Attestation. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security distributed systems, trusted computing, security models, attestation
46Adrian Leung, Liqun Chen, Chris J. Mitchell On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Privacy, Trusted Computing, DAA
45Johann Großschädl, Tobias Vejda, Dan Page Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Shane Balfe, Anish Mohammed Final Fantasy - Securing On-Line Gaming with Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth Reducing TCB complexity for security-sensitive applications: three case studies. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trusted computing base, application security
44Javier López, Antonio Maña, Antonio Muñoz A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Ubiquitous computing, Agents, Profiles, Trusted Computing
43Zhen Yang 0004, Kefeng Fan, Yingxu Lai Trusted Computing Based Mobile DRM Authentication Scheme. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Daniel M. Hein, Ronald Toegl An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile Agents, Trusted Computing, Attestation, Disaster Response
43Mario Strasser, Heiko Stamer A Software-Based Trusted Platform Module Emulator. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Sergey Bratus, Nihal D'Cunha, Evan Sparks, Sean W. Smith TOCTOU, Traps, and Trusted Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Gang Xu, Cristian Borcea, Liviu Iftode Satem: Trusted Service Code Execution across Transactions. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Santosh K. Shrivastava Satem: Trusted Service Code Execution across Transactions. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Carsten Weinhold, Hermann Härtig VPFS: building a virtual private file system with a small trusted computing base. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF legacy reuse, secure file system, virtualization
42Jennifer Horkoff, Eric S. K. Yu, Lin Liu 0001 Analyzing trust in technology strategies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the i* framework, trust, trusted computing, goal modeling, business strategies, model evaluation
41Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu SecureBus: towards application-transparent trusted computing with mandatory access control. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SecureBus, secure platform, trusted computing, mandatory access control
41Shane Balfe, Shiqun Li, Jianying Zhou 0001 Pervasive Trusted Computing. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Po-Wah Yau, Allan Tomlinson, Shane Balfe, Eimear Gallery Securing Grid Workflows with Trusted Computing (Extended Abstract). Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grid, Workflow, Trusted Computing, Attestation, Sealing
40Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg Enabling Fairer Digital Rights Management with Trusted Computing. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stateful licenses, Trusted Computing, security architectures
40Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF PEI models, secure information sharing, access control, authorization, trusted computing, security framework
40David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
39Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker A System Architecture for Reconfigurable Trusted Platforms. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Chen Li, Ye Zhang, Lijuan Duan Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Qi Cui, Wenchang Shi An Approach for Compliance Validation of Trusted Computing Applications. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Zhi-Dong Shen, Xiaoping Wu A Trusted Computing Technology Enabled Mobile Agent System. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson Trusted Computing: Providing Security for Peer-to-Peer Networks. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Steven J. Vaughan-Nichols How Trustworthy Is Trusted Computing? Search on Bibsonomy IEEE Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Lingli Deng, Yeping He, Ziyao Xu Trusted Reputation Management Service for Peer-to-Peer Collaboration. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data integrity, virtual machine, P2P, trusted computing, reputation management
38Ben Smyth, Mark Ryan 0001, Liqun Chen Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, anonymity, cryptographic protocol, trusted computing
37Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha Energy and execution time analysis of a software-based trusted platform module. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Kurt Dietrich A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Jian He, Mingdi Xu Research on Storage Security Based on Trusted Computing Platform. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Shane Balfe, Kenneth G. Paterson Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Zhiguo Shi, Yeping He, Xiaoyong Huai, Hong Zhang Identity Anonymity for Grid Computing Coordination based on Trusted Computing. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Silei Lei, Jun Liu, Junmo Xiao A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 An Approach to a Trustworthy System Architecture Using Virtualization. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
34Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas Offline count-limited certificates. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF offline payments, authentication, smartcards, trusted platform module (TPM)
34Mark Aldrich Secured Systems and Ada: A Trusted System Software Architecture. Search on Bibsonomy TRI-Ada The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Ada
33Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo Security and dynamics in customer controlled virtual workspace organisation. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation
33Andrew Cooper, Andrew P. Martin Towards an open, trusted digital rights management platform. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, digital rights management, trusted computing, DRM, mandatory access controls
32Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attestation systems, integrity monitoring, return-oriented programming
32Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Michael Jarrett, Paul Ward Trusted Computing for Protecting Ad-hoc Routing. Search on Bibsonomy CNSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble A protocol for property-based attestation. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels
32Nikos Virvilis, Dimitris Gritzalis, Theodoros K. Apostolopoulos Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? Search on Bibsonomy UIC/ATC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing: 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing, UIC-ATC 2010, 26-29 October 2010, Xi'an, China Search on Bibsonomy UIC/ATC Workshops The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 2198 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license