|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3146 occurrences of 1350 keywords
|
|
|
Results
Found 8702 publication records. Showing 8702 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
92 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
83 | Dries Schellekens, Pim Tuyls, Bart Preneel |
Embedded Trusted Computing with Authenticated Non-volatile Memory. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
72 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. |
STC |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
71 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
71 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan |
Beyond secure channels. |
STC |
2007 |
DBLP DOI BibTeX RDF |
state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack |
70 | Kurt Dietrich |
An integrated architecture for trusted computing for java enabled embedded devices. |
STC |
2007 |
DBLP DOI BibTeX RDF |
java 2 microedition, mobile trusted module, trusted computing, J2ME, mobile security |
70 | Ravi S. Sandhu, Xinwen Zhang |
Peer-to-peer access control architecture using trusted computing technology. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, trusted computing, security architecture, policy enforcement |
69 | Johannes Winter |
Trusted computing building blocks for embedded linux-based ARM trustzone platforms. |
STC |
2008 |
DBLP DOI BibTeX RDF |
arm trustzone, mobile trusted computing, linux, virtualisation |
69 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
Trust management for trusted computing platforms in web services. |
STC |
2007 |
DBLP DOI BibTeX RDF |
web services, trusted computing, properties, attestation |
64 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. |
STC |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
64 | Mike Burmester, Judie Mulholland |
The advent of trusted computing: implications for digital forensics. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery |
64 | Boris Balacheff, Liqun Chen 0002, David Plaquin, Graeme Proudler |
A trusted process to digitally sign a document. |
NSPW |
2001 |
DBLP DOI BibTeX RDF |
TCPA, authenticated image, trusted display, digital signatures, smart card |
61 | Shuyi Chen, Yingyou Wen, Hong Zhao |
Formal Analysis of Secure Bootstrap in Trusted Computing. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Guoheng Wei, Xueguang Zhou, Huanguo Zhang |
A Trusted Computing Model Based on Code Authorization. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
code authorization, virtual security units, informaion information, trusted computing |
58 | Farookh Khadeer Hussain, Elizabeth Chang 0001, Tharam S. Dillon |
Trustworthiness Measurement Methodology for e-Business. |
Advances in Web Intelligence and Data Mining |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Ronald Toegl, Thomas Winkler 0002, Mohammad Nauman, Theodore W. Hong |
Towards platform-independent trusted computing. |
STC |
2009 |
DBLP DOI BibTeX RDF |
jsr 321, java, trusted computing |
57 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. |
STC |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
54 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. |
STC |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
54 | Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo |
Layering negotiations for flexible attestation. |
STC |
2006 |
DBLP DOI BibTeX RDF |
distributed coalition, trusted virtual domains, trusted computing, remote attestation |
53 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. |
STC |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
53 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. |
STC |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
52 | Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad |
Protectit: trusted distributed services operating on sensitive data. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
traffic interception, trusted data path, data protection |
51 | Leendert van Doorn |
Trusted computing challenges. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
50 | Zhidong Shen, Qiang Tong |
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. |
HIS (3) |
2009 |
DBLP DOI BibTeX RDF |
trusted computing technology, trusted computing platform, trusted platfrom module, security, mobile Agent |
49 | Alexander Böttcher, Bernhard Kauer, Hermann Härtig |
Trusted Computing Serving an Anonymity Service. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Paul England, Talha Tariq |
Towards a Programmable TPM. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Trusted Platforms, Secure Execution, Smart Cards, Trusted Platform Module |
48 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 |
Trusted declassification: : high-level policy for a security-typed language. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification |
45 | Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang |
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Santosh K. Shrivastava |
Satem: Trusted Service Code Execution across Transactions. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Gang Xu, Cristian Borcea, Liviu Iftode |
Satem: Trusted Service Code Execution across Transactions. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Ingemar Ingemarsson, Gustavus J. Simmons |
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
45 | Sebastian Zickau, Mathias Slawik, Dirk Thatmann, Sebastian Uhlig, Iwailo Denisow, Axel Küpper |
TRESOR - Towards the Realization of a Trusted Cloud Ecosystem. |
Trusted Cloud Computing |
2014 |
DBLP DOI BibTeX RDF |
|
45 | Lorena González-Manzano, Gerd Brost, Matthias Aumüller |
An Architecture for Trusted PaaS Cloud Computing for Personal Data. |
Trusted Cloud Computing |
2014 |
DBLP DOI BibTeX RDF |
|
45 | Klaus Kursawe, Dries Schellekens |
Flexible muTPMs through disembedding. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, secure coprocessor, trusted computing, trusted platform module |
44 | Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy |
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas |
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang |
A New Data Protecting Scheme Based on TPM. |
SNPD (3) |
2007 |
DBLP DOI BibTeX RDF |
trusted platform model (TPM), storage protocol, trusted firmware |
43 | Mario Strasser, Heiko Stamer |
A Software-Based Trusted Platform Module Emulator. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jan-Erik Ekberg, Sven Bugiel |
Trust in a small package: minimized MRTM software implementation for mobile secure environments. |
STC |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, platform security, mobile phones, trusted computing, secure hardware |
42 | Premkumar T. Devanbu, Stuart G. Stubblebine |
Research Directions for Automated Software Verification: Using Trusted Hardware. |
ASE |
1997 |
DBLP DOI BibTeX RDF |
automated software verification, trusted hardware, content providers, hosted software, networked software, hosting computer, physically secure computing device, embedded certified private key, executable binary, trusted signature, scientific goals, engineering goals, testing, software agents, program verification, browsers, version control, servers, service providers, applets, checks |
42 | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas |
Offline count-limited certificates. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
offline payments, authentication, smartcards, trusted platform module (TPM) |
41 | Hao Wen, Zhengfu Han, Yibo Zhao, Guangcan Guo, Peilin Hong |
Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
quantum network, trusted relay, security, stochastic, quantum key distribution |
41 | Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa |
Encryption over Semi-trusted Database. |
DASFAA Workshops |
2009 |
DBLP DOI BibTeX RDF |
Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography |
41 | Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan |
TVDc: managing security in the trusted virtual datacenter. |
ACM SIGOPS Oper. Syst. Rev. |
2008 |
DBLP DOI BibTeX RDF |
virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control |
41 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
41 | Hai Jin 0001, Chuanjiang Yi |
CMM: Credential migration management system based on trusted computing in CGSP. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
credential migration, ChinaGrid, Daonity, grid computing, trusted computing |
41 | Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov |
A framework for trusted instruction execution via basic block signature verification. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
trusted execution, intrusion detection, computer security |
41 | Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh |
Terra: a virtual machine-based platform for trusted computing. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM |
41 | Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto |
Privacy and Trusted Computing. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
TCPA, privacy, Trusted computing |
40 | William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang 0002 |
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. |
WASA |
2009 |
DBLP DOI BibTeX RDF |
On-line Social Networks, Trusted Environment, Predators, Privacy, Cloud Service |
40 | Kurt Dietrich, Johannes Winter |
Implementation Aspects of Mobile and Embedded Trusted Computing. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Mobile Trusted Computing, MTMs, ARM TrustZone, Secure Element, JavaCard |
40 | Shane Balfe, Kenneth G. Paterson |
e-EMV: emulating EMV for internet payments with trusted computing technologies. |
STC |
2008 |
DBLP DOI BibTeX RDF |
card not present, trusted computing, EMV |
40 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
40 | Geoffrey Strongin |
The role of trusted computing in internet scale DRM. |
STC |
2006 |
DBLP DOI BibTeX RDF |
XDI, XRI, digital rights management, trusted computing, attestation, data interchange |
39 | Mohammad Torabi Dashti |
Optimistic Fair Exchange Using Trusted Devices. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, Jürgen Becker 0001 |
A System Architecture for Reconfigurable Trusted Platforms. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Fan He, Huanguo Zhang, Mei Tang |
A Test Method of Trusted Computing Supporting Software. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Chen Li, Ye Zhang, Lijuan Duan |
Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Fred B. Schneider |
Trusted Computing in Context. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Najwa Aaraj, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Energy and execution time analysis of a software-based trusted platform module. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya |
An Approach of Trusted Program Generation for User-Responsible Privacy. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Arindam Mitra, Muthucumaru Maheswaran |
Impact of Peer Churning in Trusted Gossiping for P2P Information Sharing. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
39 | Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang |
Grid System Integrated with Trusted Computing Platform. |
IMSCCS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Yuh-Jong Hu |
Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. |
Electron. Commer. Res. |
2003 |
DBLP DOI BibTeX RDF |
agent-oriented PKI, agent-mediated e-commerce (AMEC), agent trust and delegation, FIPA standards, digital certificate |
39 | Mark Aldrich |
Secured Systems and Ada: A Trusted System Software Architecture. |
TRI-Ada |
1994 |
DBLP DOI BibTeX RDF |
Ada |
39 | Rein Turn |
Private sector needs for trusted/secure computer systems. |
AFIPS National Computer Conference |
1982 |
DBLP DOI BibTeX RDF |
|
38 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Steffen Schulz 0001, Ahmad-Reza Sadeghi |
Secure VPNs for Trusted Computing Environments. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Deqing Zou, Yunfa Li 0001, Song Wu 0001, Weizhong Qiang |
A Trusted Group Signature Architecture in Virtual Computing Environment. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler 0002 |
Towards Trust Services for Language-Based Virtual Machines for Grid Computing. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Xiaolin Li 0001, Hui Kang, Patrick Harrington, Johnson Thomas |
Autonomic and Trusted Computing Paradigms. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi |
Secure storage using a sealing proxy. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, trusted platform module (TPM), sealing |
37 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
37 | Ming Qu, Shufen Liu |
A Framework of Constructing and Evolving Trusted Services with Formulation. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
Trusted Service, Service Trustiness, Sub-Ontology Evolution, Service Computing, Trusted Ontology |
37 | Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya |
The System Integrity Verification for Trusted RFID Protocol. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification |
36 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
36 | Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 |
Improving Xen security through disaggregation. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing base, disaggregation |
36 | Xiaofei Zhang, Fang Xu, Yi Liu, Xing Zhang, Changxiang Shen |
Trust Extended Dynamic Security Model and Its Application in Network. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Reliability, Access control, Measurement, Trusted computing, Security model |
36 | Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth |
Reducing TCB complexity for security-sensitive applications: three case studies. |
EuroSys |
2006 |
DBLP DOI BibTeX RDF |
trusted computing base, application security |
36 | Silvio Micali |
Simple and fast optimistic protocols for fair electronic exchange. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
invisible trusted parties, fair exchange, Optimistic Protocols, contract signing, certified e-mail |
35 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
35 | Loïc Duflot, Olivier Levillain, Benjamin Morin |
ACPI: Design Principles and Concerns. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
ACPI, trusted platforms, rootkits |
35 | Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke |
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. |
ADHOC-NOW |
2007 |
DBLP DOI BibTeX RDF |
Friend Mechanism, Trusted Community, MANET |
35 | Yanjiang Yang, Yingjiu Li, Robert H. Deng |
New Paradigm of Inference Control with Trusted Computing. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
security protocol, trusted computing, auditing, Inference control |
35 | ZhenLiu Zhou, RongSheng Xu |
BIOS Security Analysis and a Kind of Trusted BIOS. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Trust Measurement, BIOS, UEFI, Trusted Computing, TPM |
35 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. |
STC |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
35 | Andrew Cooper, Andrew P. Martin |
Towards an open, trusted digital rights management platform. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, digital rights management, trusted computing, DRM, mandatory access controls |
35 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. |
STC |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
35 | Rolf Oppliger, Ruedi Rytz |
Does Trusted Computing Remedy Computer Security Problems? |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
software-open computer systems, software-closed computer systems, software-controlled computer systems, digital rights management, Trusted Computing |
35 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
35 | Joost-Pieter Katoen, Rom Langerak, Arend Rensink (eds.) |
ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday |
ModelEd, TestEd, TrustEd |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Stefano Schivo, Rom Langerak |
Discretization of Continuous Dynamical Systems Using UPPAAL. |
ModelEd, TestEd, TrustEd |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Jan Friso Groote, Erik P. de Vink |
Problem Solving Using Process Algebra Considered Insightful. |
ModelEd, TestEd, TrustEd |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Arjan van der Schaft |
Analysis and Design of Interconnected Systems: A Systems and Control Perspective. |
ModelEd, TestEd, TrustEd |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 8702 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|