-
1
-
-
0346236349
-
-
Art and Science. Addison Wesley Professional
-
Bishop, M.: Computer Security: Art and Science. Addison Wesley Professional (2003)
-
(2003)
Computer Security
-
-
Bishop, M.1
-
2
-
-
37149052041
-
-
Trusted Computing Group: TCG architecture overview, TCG Specification
-
Trusted Computing Group: TCG architecture overview. (TCG Specification)
-
-
-
-
3
-
-
77954408441
-
-
Trusted Computing Group: version 1.2, TCG Specification
-
Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification)
-
TCG TPM specification
-
-
-
4
-
-
33845228975
-
Cryptographic processors - a survey
-
Technical Report 641, University of Cambridge
-
Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors - a survey. Technical Report 641, University of Cambridge (2005)
-
(2005)
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
7
-
-
37149048897
-
-
Microsoft: Windows Vista beta 2 trusted platform module services step by step guide. (Published on the WWW)
-
Microsoft: Windows Vista beta 2 trusted platform module services step by step guide. (Published on the WWW)
-
-
-
-
11
-
-
35348989745
-
Trusted Computing
-
Mitchell, C, ed, of, The Institution of Electrical Engineers
-
Mitchell, C., ed.: Trusted Computing. Volume 6 of IEE Professional Applications of Computing. The Institution of Electrical Engineers (2005)
-
(2005)
IEE Professional Applications of Computing
, vol.6
-
-
-
12
-
-
14844295011
-
Direct anonymous attestation
-
Pfitzmann, B, Liu, P, eds, ACM Press
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In Pfitzmann, B., Liu, P., eds.: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), ACM Press (2004) 132-145
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
13
-
-
35048847167
-
Better privacy for trusted computing platforms
-
Samarati, P, Ryan, P, Gollmann, D, Molva, R, eds, Proceedings of the 9th European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
-
Camenisch, J.: Better privacy for trusted computing platforms. In Samarati, P., Ryan, P., Gollmann, D., Molva, R., eds.: Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS 2004). Volume 3193 of Lecture Notes in Computer Science., Springer-Verlag (2004) 73-88
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 73-88
-
-
Camenisch, J.1
-
14
-
-
21644470487
-
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
-
Technical Report Dartmouth TR2003-476, Dartmouth College
-
Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report Dartmouth TR2003-476, Dartmouth College (2003)
-
(2003)
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
MacDonald, R.4
-
15
-
-
21644454794
-
Open-source applications of TCPA hardware
-
IEEE Computer Society
-
Marchesini, J., Smith, S.W., Wild, O., Barsamian, A., Stabiner, J.: Open-source applications of TCPA hardware. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), IEEE Computer Society (2004) 294-303
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC
, pp. 294-303
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Barsamian, A.4
Stabiner, J.5
-
16
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T., van Doom, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th Usenix Security Symposium. (2004) 223-238
-
(2004)
Proceedings of the 13th Usenix Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
17
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Sailer, R., Jaeger, T., Zhang, X., van Doom, L.: Attestation-based policy enforcement for remote access. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). (2004) 308-307
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS
, pp. 308-307
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doom, L.4
-
19
-
-
30144435965
-
Enhancing data authenticity and integrity in p2p systems
-
Zhang, X., Chen, S., Sandhu, R.: Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing 9(6) (2005) 42 -49
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 42-49
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
-
20
-
-
34247346997
-
Secure information sharing enabled by trusted computing and pei models
-
ACM Press
-
Sandhu, R., Ranganathan, K., Zhang, X.: Secure information sharing enabled by trusted computing and pei models. In: Proceedings of the 2006 ACM Conference on Computer and Communications Security (ASIACCS 2006), ACM Press (2006) 2-12
-
(2006)
Proceedings of the 2006 ACM Conference on Computer and Communications Security (ASIACCS
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
21
-
-
23144446730
-
Deconstructing Alice and Bob
-
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis ARSPA, of
-
Caleiro, C., Viganò, L., Basin, D.: Deconstructing Alice and Bob. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005). Volume 135 of Electronic Notes in Theoretical Computer Science. (2005) 3-22
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.135
, pp. 3-22
-
-
Caleiro, C.1
Viganò, L.2
Basin, D.3
-
22
-
-
37149032670
-
-
Master's thesis, Massachusetts Institute of Technology
-
Lin, A.H.: Automated analysis of security APIs. Master's thesis, Massachusetts Institute of Technology (2005)
-
(2005)
Automated analysis of security APIs
-
-
Lin, A.H.1
-
23
-
-
33746653767
-
Controlling access to documents: A formal access control model
-
Müller, G, ed, Proceedings of the 1st International Conference on Emerging Trends in Information and Communication Security ETRICS, of, Springer-Verlag
-
Sevinç, P.E., Basin, D., Olderog, E.R.: Controlling access to documents: A formal access control model. In Müller, G., ed.: Proceedings of the 1st International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006). Volume 3995 of Lecture Notes in Computer Science., Springer-Verlag (2006) 352-367
-
(2006)
Lecture Notes in Computer Science
, vol.3995
, pp. 352-367
-
-
Sevinç, P.E.1
Basin, D.2
Olderog, E.R.3
-
24
-
-
33746653154
-
Controlling access to documents: A formal access control model
-
Technical Report 517, ETH Zurich
-
Sevinç, P.E., Basin, D.: Controlling access to documents: A formal access control model. Technical Report 517, ETH Zurich (2006)
-
(2006)
-
-
Sevinç, P.E.1
Basin, D.2
|