Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
173 | Jai-Ming Lin, Yao-Wen Chang |
TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
173 | Jai-Ming Lin, Yao-Wen Chang |
TCG-S: orthogonal coupling of P*-admissible representations for general floorplans. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
|
144 | Jai-Ming Lin, Yao-Wen Chang |
TCG: A transitive closure graph-based representation for general floorplans. |
IEEE Trans. Very Large Scale Integr. Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
115 | Jai-Ming Lin, Guang-Ming Wu, Yao-Wen Chang, Jen-Hui Chuang |
Placement with symmetry constraints for analog layout design using TCG-S. |
ASP-DAC |
2005 |
DBLP DOI BibTeX RDF |
|
100 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. |
STC |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
100 | Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang |
Arbitrary Convex and Concave Rectilinear Module Packing Using TCG. |
DATE |
2002 |
DBLP DOI BibTeX RDF |
|
73 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
73 | Jai-Ming Lin, Hsin-Lung Chen, Yao-Wen Chang |
Arbitrarily shaped rectilinear module placement using the transitive closure graph representation. |
IEEE Trans. Very Large Scale Integr. Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
71 | SuGil Choi, Jin-Hee Han, Sung-Ik Jun |
Improvement on TCG Attestation and Its Implication for DRM. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
DRM, Remote Attestation, Relay Attack, TCG |
58 | Lihong Zhang, C.-J. Richard Shi, Yingtao Jiang |
Symmetry-aware placement with transitive closure graphs for analog layout design. |
ASP-DAC |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Leendert van Doorn |
Trusted computing challenges. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
58 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
57 | Liqun Chen 0002, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble |
A protocol for property-based attestation. |
STC |
2006 |
DBLP DOI BibTeX RDF |
TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels |
56 | Johann Großschädl, Tobias Vejda, Dan Page |
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
56 | SuGil Choi, Jin-Hee Han, Jeong-Woo Lee 0003, Jongpil Kim, Sungik Jun |
Implementation of a TCG-Based Trusted Computing in Mobile Device. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Martin Schmidt 0001, Zbigniew Michalewicz |
Test-Case Generator TCG-2 for Nonlinear Parameter Optimisation. |
PPSN |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Johannes Winter |
Trusted computing building blocks for embedded linux-based ARM trustzone platforms. |
STC |
2008 |
DBLP DOI BibTeX RDF |
arm trustzone, mobile trusted computing, linux, virtualisation |
44 | Fan He, Huanguo Zhang, Mei Tang |
A Test Method of Trusted Computing Supporting Software. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei 0001 |
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper |
On the Deployment of Mobile Trusted Modules. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Matthew D. Luciw, Juyang Weng |
Topographic Class Grouping with applications to 3D object recognition. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Ahmad-Reza Sadeghi |
Trusted Computing - Special Aspects and Challenges. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Tilen Ma, Evangeline F. Y. Young |
TCG-based multi-bend bus driven floorplanning. |
ASP-DAC |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Segla Kpodjedo, Samuel Pierre, Makan Pourzandi |
Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jill H. Y. Law, Evangeline F. Y. Young, Royce L. S. Ching |
Block alignment in 3D floorplan using layered TCG. |
ACM Great Lakes Symposium on VLSI |
2006 |
DBLP DOI BibTeX RDF |
3D floorplanning, block alignment |
42 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga |
Replay Attack in TCG Specification and Solution. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Fan Zhang, Guoqing Wu, Min Jiang, Xiaoli Liu |
Concerning about Trust of Platform Hardware. |
PACIIA (2) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Integrity, Trusted Computing, TCG, Integrity Measurement |
29 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. |
STC |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
29 | Georgios Kambourakis, Stefanos Gritzalis |
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Device authentication, Wireless security, 802.1X, TCG |
29 | Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung |
Behavioral Attestation for Business Processes. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Rui He, Lihong Zhang |
Analog placement design with constraints of multiple symmetry groups. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peayton Chen, Rita Kuo, Maiga Chang, Jia-Sheng Heh |
Designing a Trading Card Game as Educational Reward System to Improve Students' Learning Motivations. |
Edutainment |
2009 |
DBLP DOI BibTeX RDF |
Trading Card Game, Learning motivation, Game, Competition, Reward |
29 | Kurt Dietrich, Johannes Winter |
Secure Boot Revisited. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan |
GroCoca: group-based peer-to-peer cooperative caching in mobile environment. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. |
STC |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
29 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. |
STC |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
29 | Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 |
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ahmad-Reza Sadeghi |
Challenges for Trusted Computing. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Kai Song, Yonghong Tian 0001, Tiejun Huang 0001 |
Improving the Image Retrieval Results Via Topic Coverage Graph. |
PCM |
2006 |
DBLP DOI BibTeX RDF |
topic coverage, Image retrieval, re-rank |
29 | Ulrich Kühn 0001, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble |
Secure Data Management in Trusted Computing. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Lutz Lowis, Adolf Hohl |
Enabling Persistent Service Links. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan |
Group-Based Cooperative Cache Management for Mobile Clients in a Mobile Environment. |
ICPP |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ahmad-Reza Sadeghi, Christian Stüble |
Property-based attestation for computing platforms: caring about properties, not mechanisms. |
NSPW |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Veyis Nuri, Roberto H. Bamberger |
Size-limited filter banks for subband image compression. |
IEEE Trans. Image Process. |
1995 |
DBLP DOI BibTeX RDF |
|
27 | Thorsten P. Stremlau |
Protecting IoT Ecosystems and AI Leveraging TCG Standards. |
ICISSP |
2023 |
DBLP BibTeX RDF |
|
27 | Dmitriy S. Koltunov, Vasily Yu. Efimov, Vartan A. Padaryan |
Automated Testing of a TCG Frontend for Qemu. |
Program. Comput. Softw. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Lian He, Zhenxin Zhao, Yuanzhu Chen 0001, Lihong Zhang |
Placement with Sequence-Pair-Driven TCG for Advanced Analog Constraints. |
CCECE |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Juncal Alonso, Marisa Escalante, Leire Orue-Echevarria |
Transformational Cloud Government (TCG): Transforming Public Administrations with a Cloud of Public Services. |
Cloud Forward |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Taher Kourany, Emad Hegazi, Yehea Ismail |
TCG-SP: An improved floorplan representation based on an efficient hybrid of Transitive Closure Graph and Sequence Pair. |
ISCAS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Mudassar Aslam, Christian Gehrmann, Mats Björkman |
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. |
J. Inf. Secur. Appl. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Monami Takahashi, Keisuke Irie, Mizuki Sakamoto, Tatsuo Nakajima |
Incorporating fictionality into the real space: a case of enhanced TCG. |
UbiComp/ISWC Adjunct |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Laryssa Lima Muniz, Ubiratan S. C. Netto, Paulo Henrique M. Maia |
TCG - A Model-based Testing Tool for Functional and Statistical Testing. |
ICEIS (2) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Roberto Sassu, Gianluca Ramunno, Antonio Lioy |
Practical Assessment of Biba Integrity for TCG-Enabled Platforms. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Muhannad Mujahed, Hussein Jaddu, Dirk Fischer 0001, Bärbel Mertsching |
Tangential Closest Gap based (TCG) reactive obstacle avoidance navigation for cluttered environments. |
SSRR |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Xiaolin Chang, Bin Xing, Jiqiang Liu, Zhonglan Yuan, Longmei Sun |
Robust and Efficient Response to TCG TOCTOU Attacks in TPVM. |
PDCAT |
2012 |
DBLP DOI BibTeX RDF |
|
27 | |
TCG Trusted Computing Group. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Ming-Feng Lee, Bogdan Warinschi |
Security of the Enhanced TCG Privacy-CA Solution. |
TGC |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Aimin Yu, Shijun Zhao |
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. |
TrustCom |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yiming Li, Yi Li, Mingtian Zhou |
Area Optimization in Floorplanning Using AP-TCG. |
J. Convergence Inf. Technol. |
2010 |
DBLP BibTeX RDF |
|
27 | Rui He, Lihong Zhang |
Symmetry-aware TCG-based placement design under complex multi-group constraints for analog circuit layouts. |
ASP-DAC |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Liang Gu, Yao Guo 0001, Yanjiang Yang, Feng Bao 0001, Hong Mei 0001 |
Modeling TCG-Based Secure Systems with Colored Petri Nets. |
INTRUST |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Bogdan Warinschi |
Security of the TCG Privacy-CA Solution. |
EUC |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala |
LWRM: A lightweight response mechanism for TCG TOCTOU attack. |
IPCCC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Liqun Chen 0002, Mark Ryan 0001 |
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. |
Formal Aspects in Security and Trust |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ammar Alkassar, Utz Gnaida, Thomas Quirin |
MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels "Trusted Computing". |
Sicherheit |
2008 |
DBLP BibTeX RDF |
|
27 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment. |
CTS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Adolf Hohl |
Vertrauliche und nachvollziehbare Verarbeitung von Nutzerdaten in Informationsdiensten auf der Basis von TCG. |
|
2006 |
RDF |
|
27 | Reiner Sailer, Xiaolan Zhang 0001, Trent Jaeger, Leendert van Doorn |
Design and Implementation of a TCG-based Integrity Measurement Architecture. |
USENIX Security Symposium |
2004 |
DBLP BibTeX RDF |
|
27 | Jai-Ming Lin, Yao-Wen Chang |
TCG: A Transitive Closure Graph-Based Representation for Non-Slicing Floorplans. |
DAC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | M. Schmidt, Zbigniew Michalewicz |
Test-case generator TCG-2 for nonlinear parameter optimisation. |
CEC |
2000 |
DBLP DOI BibTeX RDF |
|
15 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. |
STC |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
15 | Yu Qin, Dengguo Feng, Zhen Xu |
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan |
A Property-Dependent Agent Transfer Protocol. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
15 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Analysis and design of a hardware/software trusted platform module for embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
embedded systems, multiprocessor systems, Custom instructions |
15 | Gergely Tóth, Gábor Koszegi, Zoltán Hornák |
Case study: automated security testing on the trusted computing platform. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
Flinder, OpenTC, automated security testing, trusted computing |
15 | Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 |
A System Architecture for Reconfigurable Trusted Platforms. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
15 | Kurt Dietrich |
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Qi Cui, Wenchang Shi |
An Approach for Compliance Validation of Trusted Computing Applications. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
15 | Nobuto Fujii, Mitsuyo Hashida, Haruhiro Katayose |
Strategy-acquisition system for video trading card game. |
Advances in Computer Entertainment Technology |
2008 |
DBLP DOI BibTeX RDF |
strategy acquisition, trading card game, machine learning, video game, COM |
15 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
15 | Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith |
TOCTOU, Traps, and Trusted Computing. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Paul England, Jork Löser |
Para-Virtualized TPM Sharing. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Leung, Liqun Chen 0002, Chris J. Mitchell |
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Privacy, Trusted Computing, DAA |
15 | Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama |
ws-Attestation: Enabling Trusted Computing on Web Services. |
Test and Analysis of Web Services |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
15 | Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Energy and execution time analysis of a software-based trusted platform module. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
15 | Michael A. Arbib, JinYong Lee |
Vision and Action in the Language-Ready Brain: From Mirror Neurons to SemRep. |
BVAI |
2007 |
DBLP DOI BibTeX RDF |
brain mechanisms, competition and cooperation, construction grammar, dynamic visual scenes, language perception, language production, mirror neurons, SemRep, visual perception, vision, action, action recognition, schema theory, scene descriptions |
15 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier |
Establishing Chain of Trust in Reconfigurable Hardware. |
FCCM |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo |
Security and dynamics in customer controlled virtual workspace organisation. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation |
15 | Mooseop Kim, Jaecheol Ryou 0001 |
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
15 | ZhenLiu Zhou, RongSheng Xu |
BIOS Security Analysis and a Kind of Trusted BIOS. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Trust Measurement, BIOS, UEFI, Trusted Computing, TPM |