-
1
-
-
38049048575
-
Specification Architecture Overview
-
Version 1.2, The Trusted Computing Group (TCG, Portland, Oregon, USA April
-
TCG: TCG Specification Architecture Overview. TCG Specification Version 1.2, The Trusted Computing Group (TCG), Portland, Oregon, USA (April 2003)
-
(2003)
TCG Specification
-
-
TCG, T.C.G.1
-
3
-
-
85013596514
-
Concepts of trusted computing
-
Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp, April
-
Proudler, G.: Concepts of trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 11-27 (April 2005)
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
, pp. 11-27
-
-
Proudler, G.1
-
5
-
-
0004256091
-
-
2nd edn. John Wiley and Sons Ltd, Chichester
-
Gollmann, D.: Computer Security, 2nd edn. John Wiley and Sons Ltd., Chichester (2005)
-
(2005)
Computer Security
-
-
Gollmann, D.1
-
6
-
-
0004198635
-
-
2nd edn. Prentice Hall PTR, Upper Saddle River, NJ
-
Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice Hall PTR, Upper Saddle River, NJ (1997)
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
7
-
-
0012296562
-
-
Department of Defense:, Department of Defense Trusted Computer System Evaluation Criteria
-
Department of Defense: DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (1985)
-
(1985)
DoD 5200.28-STD
-
-
-
10
-
-
17644388294
-
Trusted computing platforms, the next security solution
-
Technical Report HPL-2002-221, Hewlett-Packard Laboratories November, Available at
-
Pearson, S.: Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, Hewlett-Packard Laboratories (November 2002), Available at http://www.hpl.hp.com/techreports/
-
(2002)
-
-
Pearson, S.1
-
11
-
-
35048896564
-
-
Varadharajan, V.: Trustworthy computing. In: Zhou, X., Su, S., Papazoglou, M.M.P., Orlowska, M.E., Jeffery, K.G. (eds.) WISE 2004. LNCS, 3306, pp. 13-16. Springer, Heidelberg (2004)
-
Varadharajan, V.: Trustworthy computing. In: Zhou, X., Su, S., Papazoglou, M.M.P., Orlowska, M.E., Jeffery, K.G. (eds.) WISE 2004. LNCS, vol. 3306, pp. 13-16. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
3042699012
-
Understanding trusted computing: Will its benefits outweigh its drawbacks?
-
Feiten, E.W.: Understanding trusted computing: Will its benefits outweigh its drawbacks? IEEE Security & Privacy 1(3), 60-62 (2003)
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 60-62
-
-
Feiten, E.W.1
-
13
-
-
0033887260
-
Computing platform security in cyberspace
-
51, 54-63
-
Balacheff, B., Chen, L., Pearson, S., Proudler, G., Chan, D.: Computing platform security in cyberspace. Information Security Technical Report 5(1), 54-63 (2000)
-
(2000)
Information Security Technical Report
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Proudler, G.4
Chan, D.5
-
14
-
-
38049010311
-
How can you trust a computing platform?
-
Chen, L., Pearson, S., Proudler, G., Chan, D., Balacheff, B.: How can you trust a computing platform? In: Proceedings of Information Security Solutions Europe (ISSE 2000) (2000)
-
(2000)
Proceedings of Information Security Solutions Europe (ISSE
-
-
Chen, L.1
Pearson, S.2
Proudler, G.3
Chan, D.4
Balacheff, B.5
-
15
-
-
38049073621
-
-
TCG: TPM Main, Part 1: Design Principles. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
TCG: TPM Main, Part 1: Design Principles. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
-
-
-
16
-
-
38049019671
-
-
TCG: TPM Main, Part 2: TPM Data Structures. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
TCG: TPM Main, Part 2: TPM Data Structures. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
-
-
-
17
-
-
38049042186
-
-
TCG: TPM Main, Part 3: Commands. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
TCG: TPM Main, Part 3: Commands. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
-
-
-
-
18
-
-
38049023390
-
-
TCG: TCG Software Stack (TSS) Specification. TCG Specification Version 1.2 Level 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (January 2006)
-
TCG: TCG Software Stack (TSS) Specification. TCG Specification Version 1.2 Level 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (January 2006)
-
-
-
-
19
-
-
33745803485
-
High assurance computing on open hardware architectures
-
MSRTR-2003-20, Microsoft Corporation March
-
Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Microsoft Technical Report MSRTR-2003-20, Microsoft Corporation (March 2003)
-
(2003)
Microsoft Technical Report
-
-
Chen, Y.1
England, P.2
Peinado, M.3
Willman, B.4
-
20
-
-
0042349623
-
A trusted open platform
-
England, P., Lampson, B., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. IEEE Computer 36(7), 55-62 (2003)
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
21
-
-
33646445517
-
-
Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
-
Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
-
-
-
-
22
-
-
85013587012
-
An overview of NGSCB
-
Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp, April
-
Peinado, M., England, P., Chen, Y.: An overview of NGSCB. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 115-141 (April, 2005)
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
, pp. 115-141
-
-
Peinado, M.1
England, P.2
Chen, Y.3
-
23
-
-
78650880166
-
Flexible OS support and applications for trusted computing
-
Kauai, Hawaii, USA, USENIX, The Advanced Computing Systems Association, pp, May 18-21
-
Garfinkel, T., Rosenblum, M., Boneh, D.: Flexible OS support and applications for trusted computing. In: Proceedings of the 9th USENIX Workshop on Hot Topics on Operating Systems (HotOS-IX), Kauai, Hawaii, USA, USENIX, The Advanced Computing Systems Association, pp. 145-150 (May 18-21, 2003)
-
(2003)
Proceedings of the 9th USENIX Workshop on Hot Topics on Operating Systems (HotOS-IX)
, pp. 145-150
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
24
-
-
0013347999
-
The PERSEUS system architecture
-
3335, 93381, IBM Research Division, Zurich Laboratory April
-
Pfitzmann, B., Riordan, J., Stuble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)
-
(2001)
Technical Report RZ
-
-
Pfitzmann, B.1
Riordan, J.2
Stuble, C.3
Waidner, M.4
Weber, A.5
-
25
-
-
35048881059
-
Taming Trusted Platforms by operating system design
-
Chae, K, Yung, M, eds, Information Security Applications, Springer, Heidelberg
-
Sadeghi, A., Stuble, C.: Taming Trusted Platforms by operating system design. In: Chae, K., Yung, M. (eds.) Information Security Applications. LNCS, vol. 2908, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2908
-
-
Sadeghi, A.1
Stuble, C.2
-
26
-
-
38049026664
-
-
June
-
Kuhlmann, D., Landfermann, R., Ramasamy, H., Schunter, M., Ramunno, G., Vernizzi, D.: An open trusted computing architecture -secure virtual machines enabling user-defined policy enforcement (June 2006), www.opentc.net
-
(2006)
An open trusted computing architecture -secure virtual machines enabling user-defined policy enforcement
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
28
-
-
21644433634
-
XEN and the art of virtualization
-
Bolton Landing, New York, USA, October 19-22, ACM Press, New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., Warfield, A.: XEN and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), Bolton Landing, New York, USA, October 19-22, 2003, pp. 164-177. ACM Press, New York (2003)
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauery, R.7
Pratt, I.8
Warfield, A.9
-
29
-
-
24944584954
-
Intel: LaGrande technology architectural overview
-
Technical Report 252491-001, Intel Corporation September
-
Intel: LaGrande technology architectural overview. Technical Report 252491-001, Intel Corporation (September 2003)
-
(2003)
-
-
-
30
-
-
0242539792
-
A trusted process to digitally sign a document
-
Raskin, V, Hempelmann, C.F, eds, ACM Press, New York
-
Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: A trusted process to digitally sign a document. In: Raskin, V., Hempelmann, C.F. (eds.) Proceedings of the 2001 New Security Paradigms Workshop, pp. 79-86. ACM Press, New York (2001)
-
(2001)
Proceedings of the 2001 New Security Paradigms Workshop
, pp. 79-86
-
-
Balacheff, B.1
Chen, L.2
Plaquin, D.3
Proudler, G.4
-
31
-
-
84904269073
-
Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs
-
Dupuy, M, Paradinas, P, eds, Paris, France, June 11-13, Kluwer Academic Publishers, Boston
-
Spalka, A., Cremers, A.B., Langweg, H.: Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01). IFIP Conference Proceedings, Paris, France, June 11-13, 2001, vol. 193, pp. 403-419. Kluwer Academic Publishers, Boston (2001)
-
(2001)
Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01). IFIP Conference Proceedings
, vol.193
, pp. 403-419
-
-
Spalka, A.1
Cremers, A.B.2
Langweg, H.3
-
32
-
-
38049010839
-
Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment
-
College Park, Maryland May 29-30
-
Schechter, S.E., Greenstadt, R.A., Smith, M.D.: Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In: Proceedings of The Second Annual Workshop on Economics and Information Security (2003) College Park, Maryland (May 29-30, 2003)
-
(2003)
Proceedings of The Second Annual Workshop on Economics and Information Security
-
-
Schechter, S.E.1
Greenstadt, R.A.2
Smith, M.D.3
-
33
-
-
84955566566
-
A privacy-enhanced peer-to-peer reputation system
-
Bauknecht, K, Min Tjoa, A, Quirchmayr, G, eds, E-Commerce and Web Technologies, Springer, Heidelberg
-
Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Bauknecht, K., Min Tjoa, A., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol. 2738, pp. 206-216. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2738
, pp. 206-216
-
-
Kinateder, M.1
Pearson, S.2
-
34
-
-
85013594843
-
Securing peer-to-peer networks using trusted computing
-
Mitchell, C.J, ed, The Institute of Electrical Engineers IEE, London, UK, pp
-
Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. The Institute of Electrical Engineers (IEE), London, UK, pp. 271-298 (2005)
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
35
-
-
85013580835
-
Secure delivery of conditional access applications to mobile receivers
-
Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp
-
Gallery, E., Tomlinson, A.: Secure delivery of conditional access applications to mobile receivers. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 195-238 (2005)
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
, pp. 195-238
-
-
Gallery, E.1
Tomlinson, A.2
-
36
-
-
35048827792
-
-
Pashalidis, A., Mitchell, C.J.: Single sign-on using trusted platforms. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 54-68. Springer, Heidelberg (2003)
-
Pashalidis, A., Mitchell, C.J.: Single sign-on using trusted platforms. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 54-68. Springer, Heidelberg (2003)
-
-
-
-
37
-
-
0033659712
-
On enhancing biometric authentication with data protection
-
Howlett, R.J, Jain, L.C, eds, IEEE, Los Alamitos
-
Chen, L., Pearson, S., Vamvakas, A.: On enhancing biometric authentication with data protection. In: Howlett, R.J., Jain, L.C. (eds.) Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, vol. 1, pp. 249-252. IEEE, Los Alamitos (2000)
-
(2000)
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies
, vol.1
, pp. 249-252
-
-
Chen, L.1
Pearson, S.2
Vamvakas, A.3
-
38
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: DEXA
-
Los Alamitos
-
Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: DEXA 2003, pp. 377-382. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
377-382. IEEE Computer Society
, pp. 2003
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
39
-
-
0142250282
-
Towards accountable management of privacy and identity information
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of privacy and identity information. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 146-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 146-161
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
40
-
-
77953490662
-
A secure modular mobile agent system
-
Shanghai, China, pp, ACM Press, New York
-
Pridgen, A., Julien, C.: A secure modular mobile agent system. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multiagent systems (SELMAS '06), Shanghai, China, pp. 67-74. ACM Press, New York (2006)
-
(2006)
Proceedings of the 2006 international workshop on Software engineering for large-scale multiagent systems (SELMAS '06)
, pp. 67-74
-
-
Pridgen, A.1
Julien, C.2
-
41
-
-
84890042993
-
How trusted computers can enhance for privacy preserving mobile applications
-
Italy, pp, IEEE Computer Society, Washington, DC
-
Pearson, S.: How trusted computers can enhance for privacy preserving mobile applications. In: Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), Taormina, Sicily, Italy, pp. 609-613. IEEE Computer Society, Washington, DC (2005)
-
(2005)
Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), Taormina, Sicily
, pp. 609-613
-
-
Pearson, S.1
-
42
-
-
2442419307
-
Trusted agents that enhance user privacy by self-profiling
-
Technical Report HPL-2002-196, HP Labs, Bristol, UK July 15
-
Pearson, S.: Trusted agents that enhance user privacy by self-profiling. Technical Report HPL-2002-196, HP Labs, Bristol, UK (July 15, 2002)
-
(2002)
-
-
Pearson, S.1
-
43
-
-
35248895553
-
Privacy preserving trust agents
-
Technical Report HPL-2004-197, HP Labs, Bristol, UK November 11
-
Crane, S.: Privacy preserving trust agents. Technical Report HPL-2004-197, HP Labs, Bristol, UK (November 11, 2004)
-
(2004)
-
-
Crane, S.1
-
45
-
-
24944497930
-
A method for trust sustainability among trusted computing platforms
-
Katsikas, S.K, Lopez, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
-
Yan, Z., Cofta, Z.: A method for trust sustainability among trusted computing platforms. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 11-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3184
, pp. 11-19
-
-
Yan, Z.1
Cofta, Z.2
-
46
-
-
1142305232
-
Cryptography and competition policy -Issues with trusted computing
-
Boston, Massachsetts, USA, July 13-16, ACM, New York
-
Anderson, R.: Cryptography and competition policy -Issues with trusted computing. In: Proceedings of PODC '03, Boston, Massachsetts, USA, July 13-16, 2003, pp. 3-10. ACM, New York (2003)
-
(2003)
Proceedings of PODC '03
, pp. 3-10
-
-
Anderson, R.1
-
49
-
-
84942771624
-
Privacy and trusted computing. In: DEXA
-
Los Alamitos
-
Reid, J., Gonzalez Nieto, J.M., Dawson, E.: Privacy and trusted computing. In: DEXA 2003, pp. 383-388. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
383-388. IEEE Computer Society
, pp. 2003
-
-
Reid, J.1
Gonzalez Nieto, J.M.2
Dawson, E.3
-
50
-
-
85008038596
-
Improving the TCPA specification
-
Arbaugh, B.: Improving the TCPA specification. IEEE Computer 35(8), 77-79 (2002)
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 77-79
-
-
Arbaugh, B.1
-
51
-
-
0038650651
-
Dyad: A system for using physically secure coprocessors
-
Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, Pennsylvania, USA May
-
Tygar, J., Yee, B.: Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, Pennsylvania, USA (May 1991)
-
(1991)
-
-
Tygar, J.1
Yee, B.2
-
52
-
-
0028533131
-
BITS: A smartcard protected operating system
-
Clark, P., Hoffman, L.: BITS: a smartcard protected operating system. Communications of the ACM 37, 66-94 (1994)
-
(1994)
Communications of the ACM
, vol.37
, pp. 66-94
-
-
Clark, P.1
Hoffman, L.2
-
53
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, California, USA, pp, IEEE Computer Society Press, Los Alamitos, California
-
Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997), Oakland, California, USA, pp. 65-71. IEEE Computer Society Press, Los Alamitos, California (1997)
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P
, pp. 65-71
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
-
54
-
-
84958776015
-
-
Itoi, N., Arbaugh, W., Pollack, S., Reeves, D.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, 2119, pp. 130-141. Springer, Heidelberg (2001)
-
Itoi, N., Arbaugh, W., Pollack, S., Reeves, D.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 130-141. Springer, Heidelberg (2001)
-
-
-
-
55
-
-
27544437127
-
-
PhD thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA December
-
Lie, D.: Architectural Support for Copy and Tamper Resistant Software. PhD thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA (December 2003)
-
(2003)
Architectural Support for Copy and Tamper Resistant Software
-
-
Lie, D.1
-
56
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
ASPLOS-IX, Cambridge, Massachusetts, USA, pp, ACM Press, New York
-
Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, Massachusetts, USA, pp. 169-177. ACM Press, New York (2000)
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 169-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
57
-
-
1142280988
-
The AEGIS processor architecture for tamper-evident and tamper-resistant processing
-
San Francisco, California, USA, pp, ACM Press, New York
-
Suh, E., Clarke, D., Gassend, B., van Dyke, M., Devadas, S.: The AEGIS processor architecture for tamper-evident and tamper-resistant processing. In: 17th Annual ACM International Conference on Supercomputing (ICS'03), San Francisco, California, USA, pp. 160-171. ACM Press, New York (2003)
-
(2003)
17th Annual ACM International Conference on Supercomputing (ICS'03)
, pp. 160-171
-
-
Suh, E.1
Clarke, D.2
Gassend, B.3
van Dyke, M.4
Devadas, S.5
-
58
-
-
33845929758
-
-
Masters thesis, Department of Computer Science, The University of Auckland, New Zealand February
-
Barrett, M.F.: Towards an open trusted computing framework. Masters thesis, Department of Computer Science, The University of Auckland, New Zealand (February 2005)
-
(2005)
Towards an open trusted computing framework
-
-
Barrett, M.F.1
-
59
-
-
38049096024
-
-
TCG: TCG PC client specific implementation specification for conventional BIOS. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (July 2005)
-
TCG: TCG PC client specific implementation specification for conventional BIOS. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (July 2005)
-
-
-
-
60
-
-
34247885571
-
Intel virtualization technology for directed i/o
-
Abraham, D., Jackson, J., Muthrasanallur, S., Neiger, G., Regnier, G., Sankaran, R., Schionas, I., Uhlig, R., Vembu, B., Wiegert, J.: Intel virtualization technology for directed i/o. Intel Technology Journal 10(3), 179-192 (2006)
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 179-192
-
-
Abraham, D.1
Jackson, J.2
Muthrasanallur, S.3
Neiger, G.4
Regnier, G.5
Sankaran, R.6
Schionas, I.7
Uhlig, R.8
Vembu, B.9
Wiegert, J.10
-
61
-
-
38049038244
-
-
TCG: TCG EFI platform -for TPM family 1.1 or 1.2. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2006)
-
TCG: TCG EFI platform -for TPM family 1.1 or 1.2. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2006)
-
-
-
-
62
-
-
38049024378
-
-
TCG: TCG Credential Profiles. TCG Specification Version 1.1 Revision 1.014 For TPM Family 1,2; Level 2, The Trusted Computing Group (TCG), Portland, Oregon, USA (May 2007)
-
TCG: TCG Credential Profiles. TCG Specification Version 1.1 Revision 1.014 For TPM Family 1,2; Level 2, The Trusted Computing Group (TCG), Portland, Oregon, USA (May 2007)
-
-
-
-
63
-
-
26444450117
-
Direct anonymous attestation
-
Technical Report HPL-2004-93, Hewlett-Packard Laboratories June, Available at
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. Technical Report HPL-2004-93, Hewlett-Packard Laboratories (June 2004), Available at http ://www.hpl.hp. com/techreports/
-
(2004)
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
64
-
-
14844295011
-
Direct anonymous attestation
-
Pfitzmann, B, Liu, P, eds, ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Pfitzmann, B., Liu, P. (eds.) Proceedings of CCS '04, ACM Press, pp. 132-145. ACM Press, New York (2004)
-
(2004)
Proceedings of CCS '04, ACM Press
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
65
-
-
85013604515
-
The DAA scheme in context
-
Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp
-
Brickell, E., Camenisch, J., Chen, L.: The DAA scheme in context. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 143-174 (2005)
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
, pp. 143-174
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
66
-
-
38049066710
-
Use Case Scenarios
-
Version 2.7, The Trusted Computing Group, Mobile Phone Working Group, Portland, Oregon, USA September
-
TCG MPWG: Use Case Scenarios. TCG Specification Version 2.7, The Trusted Computing Group, Mobile Phone Working Group, Portland, Oregon, USA (September 2005)
-
(2005)
TCG Specification
-
-
MPWG, T.1
-
67
-
-
38049010840
-
-
TCG MPWG: The TCG mobile trusted module specification. TCG specification version 0.9 revision 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (September 2006)
-
TCG MPWG: The TCG mobile trusted module specification. TCG specification version 0.9 revision 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (September 2006)
-
-
-
-
68
-
-
38049078298
-
Mobile trusted module specification overview document
-
The Trusted Computing Group TCG, Beaverton, Oregon, USA
-
TCG MPWG: Mobile trusted module specification overview document. Mobile trusted module specification support documents, The Trusted Computing Group (TCG), Beaverton, Oregon, USA (2006)
-
(2006)
Mobile trusted module specification support documents
-
-
MPWG, T.1
-
69
-
-
38049038742
-
Authorisation issues for mobile code in mobile systems
-
Technical Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London
-
Gallery, E.: Authorisation issues for mobile code in mobile systems. Technical Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London (2007)
-
(2007)
-
-
Gallery, E.1
-
70
-
-
38049055660
-
-
OMA: DRM architecture v2.0. Technical Specification OMA-DRM-ARCH- V2D2004071515-C, The Open Mobile Alliance (OMA) (July 2004)
-
OMA: DRM architecture v2.0. Technical Specification OMA-DRM-ARCH- V2D2004071515-C, The Open Mobile Alliance (OMA) (July 2004)
-
-
-
-
71
-
-
38049004260
-
Digital rights management
-
Newbury, England, UK August
-
Irwin, J., Wright, T.: Digital rights management. Vodafone internal newsletter, Vodafone, Newbury, England, UK (August 2004)
-
(2004)
Vodafone internal newsletter, Vodafone
-
-
Irwin, J.1
Wright, T.2
-
73
-
-
38049001845
-
-
OMA: OMA DRM V2.0 approved enabler specification. Technical Specification OMA-ERP-DRM-V2.0-20060303-A, The Open Mobile Alliance (OMA) (July 2004)
-
OMA: OMA DRM V2.0 approved enabler specification. Technical Specification OMA-ERP-DRM-V2.0-20060303-A, The Open Mobile Alliance (OMA) (July 2004)
-
-
-
-
74
-
-
38049086925
-
-
OMA: Digital Rights Management v1.0. Technical Specification OMA-DownloadDRM-V1_0-20040615-A, The Open Mobile Alliance (OMA) (June 2004)
-
OMA: Digital Rights Management v1.0. Technical Specification OMA-DownloadDRM-V1_0-20040615-A, The Open Mobile Alliance (OMA) (June 2004)
-
-
-
-
75
-
-
38049048574
-
-
OMA: DRM architecture specification v1.0. Technical Specification OMADownload-ARCH-V1_0-20040625-A, The Open Mobile Alliance (OMA) (June 2004)
-
OMA: DRM architecture specification v1.0. Technical Specification OMADownload-ARCH-V1_0-20040625-A, The Open Mobile Alliance (OMA) (June 2004)
-
-
-
-
76
-
-
38049009286
-
-
OMA: DRM specification v2.0. Technical Specification OMA-DRM-DRM- V2_020040716-C, The Open Mobile Alliance (OMA) (July 2004)
-
OMA: DRM specification v2.0. Technical Specification OMA-DRM-DRM- V2_020040716-C, The Open Mobile Alliance (OMA) (July 2004)
-
-
-
-
77
-
-
38049051682
-
-
CMLA: Client adopter agreement. Technical Report Revision 1.00-050708, The Content Management License Administrator Limited Liability Company (CMLA, LLC) (August 2005)
-
CMLA: Client adopter agreement. Technical Report Revision 1.00-050708, The Content Management License Administrator Limited Liability Company (CMLA, LLC) (August 2005)
-
-
-
-
78
-
-
0004115865
-
-
RFC 2560, Internet Engineering Task Force IETF, June
-
Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 internet public key infrastructure: Online certificate status protocol -OCSP. RFC 2560, Internet Engineering Task Force (IETF) (June 1999)
-
(1999)
X.509 internet public key infrastructure: Online certificate status protocol -OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
79
-
-
38049018387
-
The GSM System for Mobile Communications. Cell & Sys
-
Palaiseau, France
-
Mouley, M., Pautet, M.: The GSM System for Mobile Communications. Cell & Sys. Correspondence, Palaiseau, France (1992)
-
(1992)
Correspondence
-
-
Mouley, M.1
Pautet, M.2
-
80
-
-
38049036202
-
-
3GPP GSM TSGS: Personalisation of mobile equipment (ME, Mobile functionality specification (release 5, Technical specification TS 22.022 v5.0.0, 3rd Generation Partnership Project (3GPP, Global System for Mobile Communications (GSM, Technical Specification Group Services and System Aspects, Sophia Antipolis, France 2002
-
3GPP GSM TSGS: Personalisation of mobile equipment (ME), Mobile functionality specification (release 5). Technical specification TS 22.022 v5.0.0, 3rd Generation Partnership Project (3GPP), Global System for Mobile Communications (GSM) -Technical Specification Group Services and System Aspects, Sophia Antipolis, France (2002)
-
-
-
-
82
-
-
38049016271
-
-
OMA: Device management requirements candidate version 1.2. Technical Specification OMA-RD-DM-V1_2-20060424-C., The Open Mobile Alliance (OMA) (April 2006)
-
OMA: Device management requirements candidate version 1.2. Technical Specification OMA-RD-DM-V1_2-20060424-C., The Open Mobile Alliance (OMA) (April 2006)
-
-
-
-
83
-
-
38049021929
-
Overview and definition of software download for rf reconfiguration. SDRF Archived Approved Document DL-DFN Document SDRF-02-A-0002-V.O.O
-
SDRF
-
SDRF: Overview and definition of software download for rf reconfiguration. SDRF Archived Approved Document DL-DFN Document SDRF-02-A-0002-V.O.O, The Software Defined Radio Forum (SDRF) (August 2002)
-
(2002)
The Software Defined Radio Forum (SDRF) (August
-
-
-
84
-
-
84862483002
-
Broadcasting and Mobile Telecommunications: Interworking -Not Convergence
-
Tuttlebee, W., Babb, D., Irvine, J., Martinez, G., Worrall, K.: Broadcasting and Mobile Telecommunications: Interworking -Not Convergence. EBU Technical Review 293, 1-11 (2003)
-
(2003)
EBU Technical Review
, vol.293
, pp. 1-11
-
-
Tuttlebee, W.1
Babb, D.2
Irvine, J.3
Martinez, G.4
Worrall, K.5
-
85
-
-
38049078297
-
-
European Committee for Electrotechnical Standardization (CENELEC, Belgium: Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications February
-
European Committee for Electrotechnical Standardization (CENELEC) Brussels, Belgium: Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications (February 1997)
-
(1997)
Brussels
-
-
-
88
-
-
38049077797
-
Wireless transport layer security version 06. Technical Specification WAP2610WTLS-20010406-a
-
WAPF
-
WAPF: Wireless transport layer security version 06. Technical Specification WAP2610WTLS-20010406-a, The Wireless Application Protocol Forum (WAPF) (April 2001)
-
(2001)
The Wireless Application Protocol Forum (WAPF) (April
-
-
-
90
-
-
20444491197
-
Threat analysis of GNU software radio
-
Palo Alto, California, USA May 24-27
-
Hill, R., Myagmar, S., Campbell, R.: Threat analysis of GNU software radio. In: Proceedings of the World Wireless Congress (WWC 2005), Palo Alto, California, USA (May 24-27, 2005)
-
(2005)
Proceedings of the World Wireless Congress (WWC
-
-
Hill, R.1
Myagmar, S.2
Campbell, R.3
-
91
-
-
38049087423
-
Security considerations for operational software defined radio devices in a commercial wireless domain. SDRF working document
-
SDRF
-
SDRF: Security considerations for operational software defined radio devices in a commercial wireless domain. SDRF working document, The Software Defined Radio Forum (SDRF) (October 2004)
-
(2004)
The Software Defined Radio Forum (SDRF) (October
-
-
-
92
-
-
38049042717
-
Protection of downloadable software on SDR devices
-
November 14-18
-
Gallery, E., Tomlinson, A.: Protection of downloadable software on SDR devices. In: Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, Software Defined Radio Forum (SDRF) (November 14-18, 2005)
-
(2005)
Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, Software Defined Radio Forum (SDRF)
-
-
Gallery, E.1
Tomlinson, A.2
-
93
-
-
38049040709
-
-
TCG: Subject key attestation evidence extension. TCG specification version 1.0 revision 7, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2005)
-
TCG: Subject key attestation evidence extension. TCG specification version 1.0 revision 7, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2005)
-
-
-
|