|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 179 occurrences of 104 keywords
|
|
|
Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
160 | Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Energy and execution time analysis of a software-based trusted platform module. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
150 | Hua Wang, Yao Guo 0001, Xia Zhao, Xiangqun Chen |
Keep Passwords Away from Memory: Password Caching and Verification Using TPM. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
OIAP, Password Authentication, TPM |
147 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
140 | Paul England, Jork Löser |
Para-Virtualized TPM Sharing. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
133 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Analysis and design of a hardware/software trusted platform module for embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
embedded systems, multiprocessor systems, Custom instructions |
124 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. |
STC |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
116 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. |
STC |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
114 | Paul England, Talha Tariq |
Towards a Programmable TPM. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Trusted Platforms, Secure Execution, Smart Cards, Trusted Platform Module |
114 | Fenghua Li, Wei Wang 0105, Jianfeng Ma 0001, Zhenguo Ding |
Enhanced Architecture of TPM. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
100 | Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf |
Revocation of TPM Keys. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
93 | Frederic Stumpf, Claudia Eckert 0001 |
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
87 | Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 |
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz 0001 |
Facilitating the Use of TPM Technologies through S&D Patterns. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
76 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
74 | Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Property-Based TPM Virtualization. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang |
A New Data Protecting Scheme Based on TPM. |
SNPD (3) |
2007 |
DBLP DOI BibTeX RDF |
trusted platform model (TPM), storage protocol, trusted firmware |
67 | Qi Cui, Wenchang Shi |
An Approach for Compliance Validation of Trusted Computing Applications. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas |
Offline untrusted storage with immediate detection of forking and replay attacks. |
STC |
2007 |
DBLP DOI BibTeX RDF |
forking attack, untrusted storage, virtual monotonic counters, TPM, replay attack, freshness, integrity checking |
60 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. |
STC |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
53 | Klaus Kursawe, Dries Schellekens |
Flexible muTPMs through disembedding. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, secure coprocessor, trusted computing, trusted platform module |
53 | Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith |
TOCTOU, Traps, and Trusted Computing. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Johann Großschädl, Tobias Vejda, Dan Page |
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Tieming Chen, Samuel H. Huang |
Tree parity machine-based One-Time Password authentication schemes. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier |
Establishing Chain of Trust in Reconfigurable Hardware. |
FCCM |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Vandana Gunupudi, Stephen R. Tate |
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Alke Martens |
Time in the Adaptive Tutoring Process Model. |
Intelligent Tutoring Systems |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Louis Goubin, Nicolas T. Courtois |
Cryptanalysis of the TTM Cryptosystem. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
50 | Kristof Verslype, Bart De Decker |
A Flexible and Open DRM Framework. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, smart card, Digital Rights Management, DRM, TPM |
47 | Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan |
Efficient Identity-Based Key Issue with TPM. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem |
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Lick Lun Nick Ng, Dickson K. W. Chiu, Patrick C. K. Hung |
Tendering Process Model (TPM) Implementation for B2B Integration in a Web Services Environment. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Benoît Bertholon, Sébastien Varrette, Pascal Bouvry |
Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
Scyther, Avispa, Cloud Computing, TPM, IaaS |
44 | Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel |
Formal Analysis of Protocols Based on TPM State Registers. |
CSF |
2011 |
DBLP DOI BibTeX RDF |
formal verification, TPM |
41 | Daniel Moghimi, Berk Sunar, Thomas Eisenbarth 0001, Nadia Heninger |
TPM-FAIL: TPM meets Timing and Lattice Attacks. |
USENIX Security Symposium |
2020 |
DBLP BibTeX RDF |
|
41 | Daniel Moghimi, Berk Sunar, Thomas Eisenbarth 0001, Nadia Heninger |
TPM-FAIL: TPM meets Timing and Lattice Attacks. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
41 | Jan Camenisch, Liqun Chen 0002, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian |
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
41 | Jan Camenisch, Liqun Chen 0002, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian |
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. |
IEEE Symposium on Security and Privacy |
2017 |
DBLP DOI BibTeX RDF |
|
40 | Hailun Tan, Wen Hu, Sanjay Jha 0001 |
A hardware-based remote attestation protocol in wireless sensor networks. |
IPSN |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, trusted platform module, remote attestation |
40 | Akshay Dua, Wen Hu, Nirupama Bulusu |
Demo abstract: A Trusted Platform based framework for participatory sensing. |
IPSN |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Ronald Toegl |
Tagging the Turtle: Local Attestation for Kiosk Computing. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Kiosk Computing, Trusted Computing, Near Field Communication, Attestation |
40 | Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller |
Attacking the BitLocker Boot Process. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Zhuang Song, Suyash P. Awate, James C. Gee |
Nonparametric Markov priors for tissue segmentation. |
ISBI |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Yu-Tso Chen, Ahren Studer, Adrian Perrig |
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Hou Huifang, Liu Guangqiang |
User Authentication Based on Trusted Computing and CPK for Mobile Terminal in HWN. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Bang-Hung Yang, Shyh-Jen Wang, Yuan-Hwa Chou, Tung-Ping Su, Shih-Pei Chen, Jih-Shian Lee, Jyh-Cheng Chen |
Evaluation of Reference Tissue Model for Serotonin Transporters Using [123I] ADAM Tracer. |
MIMI |
2007 |
DBLP DOI BibTeX RDF |
serotonin transporters, reference tissue model, [123I] ADAM, binding potential |
40 | Julien Burlet, Olivier Aycard, Anne Spalanzani, Christian Laugier |
Adaptive Interacting Multiple Models applied on pedestrian tracking in car parks. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Julian Jang, Surya Nepal, John Zic |
Establishing a Trust Relationship in Cooperative Information Systems. |
OTM Conferences (1) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Wen Chan Shih, Wen Hu, Peter I. Corke, Leslie Overs |
A public key technology platform for wireless sensor networks. |
SenSys |
2008 |
DBLP DOI BibTeX RDF |
tpm, wireless sensor networks, rsa, public key |
37 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. |
STC |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
37 | ZhenLiu Zhou, RongSheng Xu |
BIOS Security Analysis and a Kind of Trusted BIOS. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Trust Measurement, BIOS, UEFI, Trusted Computing, TPM |
36 | Peter Djalaliev, José Carlos Brustoloni |
Secure web-based retrieval of documents with usage controls. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
trusted platform module (TPM), digital rights management (DRM) |
36 | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas |
Offline count-limited certificates. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
offline payments, authentication, smartcards, trusted platform module (TPM) |
34 | Aimin Yu, Dengguo Feng, Ren Liu |
TBDRM: A TPM-Based Secure DRM Architecture. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Antonio Muñoz 0001, Antonio Maña, Rajesh Harjani, Marioli Montenegro |
Agent Protection Based on the Use of Cryptographic Hardware. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Rongwei Yu, Lina Wang, Xiao-yan Ma, Bo Kuang |
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
27 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan |
TVDc: managing security in the trusted virtual datacenter. |
ACM SIGOPS Oper. Syst. Rev. |
2008 |
DBLP DOI BibTeX RDF |
virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control |
27 | Gang Wang 0007, Kehu Yang |
Bayesian estimation of transition probabilities in hybrid systems via convex optimization. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Xiaofeng Chen 0004, Dengguo Feng |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li |
Research on Automated Testing of the Trusted Platform Model. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Kurt Dietrich |
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Mario Strasser, Heiko Stamer |
A Software-Based Trusted Platform Module Emulator. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Valeri Kirischian, Vadim Geurkov, Lev Kirischian |
A multi-mode video-stream processor with cyclically reconfigurable architecture. |
Conf. Computing Frontiers |
2008 |
DBLP DOI BibTeX RDF |
cost-performance ratio, video-stream processor, FPGA, computer architecture, reconfigurable computing, dynamic reconfiguration, pre-fetching, temporal partitioning |
27 | Hai Jin 0001, Chuanjiang Yi |
CMM: Credential migration management system based on trusted computing in CGSP. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
credential migration, ChinaGrid, Daonity, grid computing, trusted computing |
27 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
27 | Hiroshi Tamura, Tamami Sugasaka, Satoko Horikawa, Kazuhiro Ueda |
Designing Ubiquitous Shopping Support Systems Based on Human-Centered Approach. |
HCI (6) |
2007 |
DBLP DOI BibTeX RDF |
shopping experience, shopping process, ubiquitous computing, human-centered design, ethnographic research |
27 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
27 | Ulrich Großmann, Enrik Berkhan, Luciana C. Jatoba, Jörg Ottenbacher, Wilhelm Stork, Klaus D. Müller-Glaser |
Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
Teletherapy of pain, remote controlled infusion pump, platform integrity of resource constrained device |
27 | Yangmin Li 0001, Qingsong Xu |
A New Approach to the Architecture Optimization of a General 3-PUU Translational Parallel Manipulator. |
J. Intell. Robotic Syst. |
2006 |
DBLP DOI BibTeX RDF |
translational parallel manipulator, kinematics, optimal design, workspace, dexterity |
27 | Kenneth A. Goldman, Ronald Perez, Reiner Sailer |
Linking remote attestation to secure tunnel endpoints. |
STC |
2006 |
DBLP DOI BibTeX RDF |
certificates, trusted platform module |
27 | Matt Barrett, Clark D. Thomborson |
Frameworks Built on the Trusted Platform Module. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Reiner Sailer, Trent Jaeger, Xiaolan Zhang 0001, Leendert van Doorn |
Attestation-based policy enforcement for remote access. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, security management, remote access |
27 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
27 | Thomas Dreier, Georg Nolte |
The German Copyright - Yesterday, Today, Tomorrow. |
Digital Rights Management |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Vesselin P. Jilkov, X. Rong Li, Donka S. Angelova |
Estimation of Markovian Jump Systems with Unknown Transition Probabilities through Bayesian Sampling. |
Numerical Methods and Application |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
23 | Bryan Parno, Jonathan M. McCune, Adrian Perrig |
Bootstrapping Trust in Commodity Computers. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Code Identity, Trust, Trusted Computing, Bootstrap, TPM, Trusted Platform Module, Secure Boot |
23 | Benjamin Bock, David Huemer, A Min Tjoa |
Towards More Trustable Log Files for Digital Forensics by Means of . |
AINA |
2010 |
DBLP DOI BibTeX RDF |
tpm, authentication, trust, trusted, validation, computing, log, logging, svm |
23 | Hamed Khiabani, Zailani Mohamed Sidek, Jamalul-lail Ab Manan |
Towards a Unified Trust Model in Pervasive Systems. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Trust, Pervasive Computing, Formalization, Trustworthiness, TPM |
22 | Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi |
Secure storage using a sealing proxy. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, trusted platform module (TPM), sealing |
22 | José Carlos Brustoloni, Ricardo Villamarín-Salomón, Peter Djalaliev, David Kyle |
Evaluating the usability of usage controls in electronic collaboration. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
electronic collaboration, digital rights management, usage controls, trusted platform module (TPM) |
20 | Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil |
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Liqun Chen 0002, Nada El Kassem, Christopher J. P. Newton |
How To Bind A TPM's Attestation Keys With Its Endorsement Key. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Matheus Bichara de Assumpção, Marcelo Abdalla dos Reis, Marcos Roberto Marcondes, Pedro Monteiro da Silva Eleuterio, Victor Hugo Vieira |
Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI. |
Forensic Sci. Int. Digit. Investig. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Luís Fiolhais, Leonel Sousa |
QR TPM in Programmable Low-Power Devices. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yani Ziani, Nikolai Kosmatov, Frédéric Loulergue, Daniel Gracia Pérez, Téo Bernier |
Towards Formal Verification of a TPM Software Stack. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, Bibhudutta Rout |
iTPM: Exploring PUF-based Keyless TPM for Security-by-Design of Smart Electronics. |
ISVLSI |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Anais Jimenez-Ballumbrosio, Diana Rodriguez-Herran, Percy Castro-Rangel |
Improvement Proposal to Increase the Availability of Machines in The Thermoforming Line of a Plastic Industry Applying TPM, SMED And Standardized Work Tools. |
ICIBE |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ronald Yalico-Luciano, Jesus Herrada-Galvez, Percy Castro-Rangel |
Reduction of the Rate of Defective Products in A Metalworking Company, Through the Implementation of TPM, 5S And Process Standardization Tools. |
ICIBE |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Raphael Schermann, Rainer Urian, Christian Steger |
Integration of the TPM in the AACKA Protocol. |
DSD |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Huaize Dong, Yifan Jiao, Bing-Kun Bao |
TPM: Two-Stage Prediction Mechanism for Universal Adversarial Patch Defense. |
ICIG (5) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yani Ziani, Nikolai Kosmatov, Frédéric Loulergue, Daniel Gracia Pérez, Téo Bernier |
Towards Formal Verification of a TPM Software Stack. |
iFM |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, Bibhudutta Rout |
PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT. |
ACM Great Lakes Symposium on VLSI |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Mathieu Gross, Konrad Hohentanner, Stefan Wiehler, Georg Sigl |
Enhancing the Security of FPGA-SoCs via the Usage of ARM TrustZone and a Hybrid-TPM. |
ACM Trans. Reconfigurable Technol. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Mingwu Zhang, Boyao Zhu, Yumei Li 0003, Yuntao Wang 0002 |
TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs. |
Symmetry |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Luiz Carlos Branquinho Caixeta Ferreira, Renan Yamaguti, Omar Carvalho Branquinho, Paulo Cardieri |
A TpM-based collaborative system to teach IoT. |
Comput. Appl. Eng. Educ. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Rui Wang, Yonghang Yan |
A Novel Trusted Boot Model for Embedded Smart Device without TPM. |
ICACT |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Dawei Li, Yingpeng Zhang, Jian Cui, Di Liu, Yu Sun 0015, Zhenyu Guan, Xu Wang |
Remote Audit Scheme of Embedded Device Software Based on TPM. |
BigDataSecurity/HPSC/IDS |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 318 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|