-
1
-
-
33846331870
-
-
IBM Watson Research Center, TCPA Resources
-
IBM Watson Research Center, Global Security Analysis Lab: TCPA Resources, http://www.research.ibm.com/gsal/tcpa/TPM-2.0.tar.gz.
-
Global Security Analysis Lab
-
-
-
2
-
-
33846323489
-
-
Trusted Computing Group
-
Trusted Computing Group. http://www.trustedcomputinggroup.org.
-
-
-
-
7
-
-
1142270162
-
-
Prentice Hall PTR
-
B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted Computing Platforms, tcpa technology in context. Prentice Hall PTR, 2003.
-
(2003)
Trusted Computing Platforms, tcpa technology in context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
8
-
-
0039334690
-
Verifying Security Protocols with Brutus
-
Oct
-
E. M. Clarke, S. Jha, and W. Marrero. Verifying Security Protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 9(4):443-487, Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
10
-
-
0042349623
-
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
-
-
-
-
11
-
-
33846311977
-
-
C. Hoare. Communicating Sequential Processes, Elettronic version available at http://www.usingcsp.com, first published in 1985 by Prentice Hall International, 2004.
-
C. Hoare. Communicating Sequential Processes, Elettronic version available at http://www.usingcsp.com, first published in 1985 by Prentice Hall International, 2004.
-
-
-
-
12
-
-
0020167560
-
A theory for protocol validation
-
Aug
-
G. J. Holzmann. A theory for protocol validation. IEEE Transactions on Computers, C-31(8):730-738, Aug. 1982.
-
(1982)
IEEE Transactions on Computers
, vol.C-31
, Issue.8
, pp. 730-738
-
-
Holzmann, G.J.1
-
13
-
-
18944390941
-
The model checker spin
-
G. J. Holzmann. The model checker spin. IEEE Trans. Softw. Eng., 23(5):279-295, 1997.
-
(1997)
IEEE Trans. Softw. Eng
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
14
-
-
0041491608
-
Clarifying straight replays and forced delays
-
T. Kwon and J. Song. Clarifying straight replays and forced delays. SIGOPS Oper. Syst. Rev., 33(1):47-52, 1999.
-
(1999)
SIGOPS Oper. Syst. Rev
, vol.33
, Issue.1
, pp. 47-52
-
-
Kwon, T.1
Song, J.2
-
17
-
-
0003777431
-
-
Addison-Wesley
-
Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe, and Bill Roscoe. Modelling & Analysis of Security Protocols. Addison-Wesley, 2000.
-
(2000)
Modelling & Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
18
-
-
85084162270
-
Design and Implementation of a TCG-based Integrity Measurement Architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223-238, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
20
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: a virtual machine-based platform for trusted computing. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 193-206. ACM Press, 2003.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
|