|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 97 occurrences of 65 keywords
|
|
|
Results
Found 43 publication records. Showing 43 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ronald Toegl, Thomas Winkler 0002, Mohammad Nauman, Theodore W. Hong |
Towards platform-independent trusted computing. |
STC |
2009 |
DBLP DOI BibTeX RDF |
jsr 321, java, trusted computing |
1 | Jan-Erik Ekberg, Sven Bugiel |
Trust in a small package: minimized MRTM software implementation for mobile secure environments. |
STC |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module, platform security, mobile phones, trusted computing, secure hardware |
1 | Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy |
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. |
STC |
2009 |
DBLP DOI BibTeX RDF |
attestation systems, integrity monitoring, return-oriented programming |
1 | Carl Gebhardt, Chris I. Dalton |
LaLa: a late launch application. |
STC |
2009 |
DBLP DOI BibTeX RDF |
late launch, virtualization, trusted computing |
1 | Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert (eds.) |
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009 |
STC |
2009 |
DBLP BibTeX RDF |
|
1 | René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan |
A practical property-based bootstrap architecture. |
STC |
2009 |
DBLP DOI BibTeX RDF |
mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot |
1 | Michael S. Kirkpatrick, Elisa Bertino |
Physically restricted authentication with trusted hardware. |
STC |
2009 |
DBLP DOI BibTeX RDF |
authentication, discrete logarithm, zero-knowledge proof, physical unclonable functions, applied cryptography |
1 | Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, Mark A. Gondree |
MYSEA: the monterey security architecture. |
STC |
2009 |
DBLP DOI BibTeX RDF |
authentication, access controls, information flow controls, cryptographic controls |
1 | Juan Du 0006, Wei Wei, Xiaohui Gu, Ting Yu 0001 |
Towards secure dataflow processing in open distributed systems. |
STC |
2009 |
DBLP DOI BibTeX RDF |
secure component composition, secure data processing, service oriented architecture, cloud computing |
1 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
1 | Yin Hu, Ghaith Hammouri, Berk Sunar |
A fast real-time memory authentication protocol. |
STC |
2008 |
DBLP DOI BibTeX RDF |
fast authentication, memory integrity, universal hash |
1 | Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei 0001 |
Remote attestation on program execution. |
STC |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, program dependency, remote attestation |
1 | Mark Thober, J. Aaron Pendergrass, C. Durward McDonell |
Improving coherency of runtime integrity measurement. |
STC |
2008 |
DBLP DOI BibTeX RDF |
LKIM, coherency, XEN, copy-on-write, integrity measurement |
1 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. |
STC |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
1 | Johannes Winter |
Trusted computing building blocks for embedded linux-based ARM trustzone platforms. |
STC |
2008 |
DBLP DOI BibTeX RDF |
arm trustzone, mobile trusted computing, linux, virtualisation |
1 | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala |
Scheduling execution of credentials in constrained secure environments. |
STC |
2008 |
DBLP DOI BibTeX RDF |
onboard credentials, secure execution environments, trusted hardware, scheduling |
1 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. |
STC |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
1 | Frederic Stumpf, Andreas Fuchs 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Improving the scalability of platform attestation. |
STC |
2008 |
DBLP DOI BibTeX RDF |
attestation protocols, integrity reporting, performance, scalability, trusted computing, remote attestation |
1 | Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert (eds.) |
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 |
STC |
2008 |
DBLP BibTeX RDF |
|
1 | Shane Balfe, Kenneth G. Paterson |
e-EMV: emulating EMV for internet payments with trusted computing technologies. |
STC |
2008 |
DBLP DOI BibTeX RDF |
card not present, trusted computing, EMV |
1 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
Trust management for trusted computing platforms in web services. |
STC |
2007 |
DBLP DOI BibTeX RDF |
web services, trusted computing, properties, attestation |
1 | Soontaree Tanaraksiritavorn, Shivakant Mishra |
Flexible intrusion tolerant voting architecture. |
STC |
2007 |
DBLP DOI BibTeX RDF |
fragmentation-redundancy-scattering, threshold cryptography, byzantine fault tolerance, reliable system |
1 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. |
STC |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
1 | Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, C. Durward McDonell |
Linux kernel integrity measurement using contextual inspection. |
STC |
2007 |
DBLP DOI BibTeX RDF |
LKIM, attestation systems, system monitoring, integrity measurement |
1 | Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas |
Offline untrusted storage with immediate detection of forking and replay attacks. |
STC |
2007 |
DBLP DOI BibTeX RDF |
forking attack, untrusted storage, virtual monotonic counters, TPM, replay attack, freshness, integrity checking |
1 | Kurt Dietrich |
An integrated architecture for trusted computing for java enabled embedded devices. |
STC |
2007 |
DBLP DOI BibTeX RDF |
java 2 microedition, mobile trusted module, trusted computing, J2ME, mobile security |
1 | Leendert van Doorn |
Trusted computing challenges. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted computing |
1 | Yair Amir |
The insider threat in scalable distributed systems: algorithms, metrics and gaps. |
STC |
2007 |
DBLP DOI BibTeX RDF |
distributed system, insider threat |
1 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf |
Reconfigurable trusted computing in hardware. |
STC |
2007 |
DBLP DOI BibTeX RDF |
field programmable gate array (FPGA), trusted computing, trusted platform module (TPM) |
1 | David Kyle, José Carlos Brustoloni |
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. |
STC |
2007 |
DBLP DOI BibTeX RDF |
LSM, ODRL, UCLinux, encrypted file system, linux security module, open digital rights language, trusted computing group, linux, trusted computing, usage controls, TPM, trusted platform module, TCG |
1 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
1 | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung (eds.) |
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 |
STC |
2007 |
DBLP BibTeX RDF |
|
1 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan |
Beyond secure channels. |
STC |
2007 |
DBLP DOI BibTeX RDF |
state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack |
1 | Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo |
Layering negotiations for flexible attestation. |
STC |
2006 |
DBLP DOI BibTeX RDF |
distributed coalition, trusted virtual domains, trusted computing, remote attestation |
1 | Liqun Chen 0002, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble |
A protocol for property-based attestation. |
STC |
2006 |
DBLP DOI BibTeX RDF |
TCG binary attestation, property-based attestation, zero-knowledge proof of knowledge, security kernels |
1 | Wenbo Mao, Fei Yan, Chunrun Chen |
Daonity: grid security with behaviour conformity from trusted computing. |
STC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. |
STC |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
1 | Krzysztof Ostrowski, Kenneth P. Birman |
Scalable group communication system for scalable trust. |
STC |
2006 |
DBLP DOI BibTeX RDF |
group communication |
1 | Kenneth P. Birman |
Scalable trust: engineering challenge or complexity barrier? |
STC |
2006 |
DBLP DOI BibTeX RDF |
scalable trust |
1 | Kenneth A. Goldman, Ronald Perez, Reiner Sailer |
Linking remote attestation to secure tunnel endpoints. |
STC |
2006 |
DBLP DOI BibTeX RDF |
certificates, trusted platform module |
1 | Geoffrey Strongin |
The role of trusted computing in internet scale DRM. |
STC |
2006 |
DBLP DOI BibTeX RDF |
XDI, XRI, digital rights management, trusted computing, attestation, data interchange |
1 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. |
STC |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
1 | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung (eds.) |
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 |
STC |
2006 |
DBLP BibTeX RDF |
|
Displaying result #1 - #43 of 43 (100 per page; Change: )
|
|