-
1
-
-
41549094150
-
-
ARM Ltd
-
ARM Ltd. AKM TrustZone. www.arm.com/products/esd/trustzone_home.html
-
AKM TrustZone
-
-
-
2
-
-
21644433634
-
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho. A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho. A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
-
-
-
-
3
-
-
41549100618
-
-
Ginzboorg, P., Ekberg, J.-E., Laitinen, P., Ylä-Jääski, A.: Charging for Broadband Access. In: ICTEC'98: Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce (November 1998)
-
Ginzboorg, P., Ekberg, J.-E., Laitinen, P., Ylä-Jääski, A.: Charging for Broadband Access. In: ICTEC'98: Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce (November 1998)
-
-
-
-
6
-
-
0030243542
-
Towards Real Microkernels
-
Liedtke, J.: Towards Real Microkernels. Communications of the ACM 39(9), 70-77 (1996)
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 70-77
-
-
Liedtke, J.1
-
7
-
-
0000675337
-
Superdistribution: The Concept and the Architecture
-
Mori, K., Kawahara, M.: Superdistribution: The Concept and the Architecture. Transactions of the IEICE E 73(7), 1133-1146 (1990)
-
(1990)
Transactions of the IEICE E
, vol.73
, Issue.7
, pp. 1133-1146
-
-
Mori, K.1
Kawahara, M.2
-
8
-
-
33749054480
-
-
Nair, S.K., Popescu, B.C., Gamage, C. Crispo, B., Tanenbaum, A.S.: Enabling DKM-preserving Digital Content Redistribution. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology (July 2005)
-
Nair, S.K., Popescu, B.C., Gamage, C. Crispo, B., Tanenbaum, A.S.: Enabling DKM-preserving Digital Content Redistribution. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology (July 2005)
-
-
-
-
9
-
-
41549141374
-
-
Open Mobile Alliance. OMA DKM Version 2.0 March 2006
-
Open Mobile Alliance. OMA DKM Version 2.0 (March 2006). http://www.openmobilealliance.org
-
-
-
-
10
-
-
38149014725
-
-
Sadeghi, A.-K., Wolf, M., Stüble, C., Asokan, N., Ekberg. J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, K. (eds.) ISC 2007, LNCS. 4779, Springer, Heidelberg (2007)
-
Sadeghi, A.-K., Wolf, M., Stüble, C., Asokan, N., Ekberg. J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, K. (eds.) ISC 2007, LNCS. vol. 4779, Springer, Heidelberg (2007)
-
-
-
-
11
-
-
30144435491
-
Peer-to-Peer Access Control Architecture Using Trusted Computing Technology
-
Stockholm, Sweden June
-
Sandhu, K., Zhang, X.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: SACMAT 2005, Stockholm, Sweden (June 2005)
-
(2005)
SACMAT
-
-
Sandhu, K.1
Zhang, X.2
-
12
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Sarmenta, L.F.G., van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: STC 2006: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, pp. 27-42 (2006)
-
(2006)
STC 2006: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
13
-
-
0003449566
-
Secure Coprocessing Applications and Research Issues
-
Los Alamos National Laboratory
-
Smith, S.W.: Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory (1996)
-
(1996)
Los Alamos Unclassified Release LA-UR-96-2805
-
-
Smith, S.W.1
-
14
-
-
41549091400
-
Beyond Secure Channels
-
Stewin, P., Sadeghi, A.-R., Unger, M., Gasmi, Y., Asokan, N.: Beyond Secure Channels. In: STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (2007)
-
(2007)
STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing
-
-
Stewin, P.1
Sadeghi, A.-R.2
Unger, M.3
Gasmi, Y.4
Asokan, N.5
-
15
-
-
1142280988
-
AEGIS: Architecture for Tamper-evident and Tamper-resist ant Processing
-
Suh, G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-evident and Tamper-resist ant Processing. In: Proceedings of the Annual USENIX Technical Conference (2003)
-
(2003)
Proceedings of the Annual USENIX Technical Conference
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
16
-
-
84870642654
-
TPM Main Specification
-
Trusted Computing Group, Technical Report Version 1.2 Revision 94
-
Trusted Computing Group. TPM Main Specification. Technical Report Version 1.2 Revision 94 (2006)
-
(2006)
-
-
-
18
-
-
41549161207
-
-
Tygar, J.D., Yee, B.S.: Strongbox: A System for Self-Securing Programs. In: CMU Computer Science: A 25th Anniversary Commemorative, pp. 163-197, Addison-Wesley, Reading (1991)
-
Tygar, J.D., Yee, B.S.: Strongbox: A System for Self-Securing Programs. In: CMU Computer Science: A 25th Anniversary Commemorative, pp. 163-197, Addison-Wesley, Reading (1991)
-
-
-
-
19
-
-
41549137001
-
-
Tygar, J.D., Yee, B.S.: Dyad: A System for Using Physically Secure Coprocessors. In: Proceedings of the IP Workshop (1994)
-
Tygar, J.D., Yee, B.S.: Dyad: A System for Using Physically Secure Coprocessors. In: Proceedings of the IP Workshop (1994)
-
-
-
-
20
-
-
0023171210
-
-
White, S.R., Comerford, L.D.: ABYSS: A Trusted Architecture for Software Protection. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)
-
White, S.R., Comerford, L.D.: ABYSS: A Trusted Architecture for Software Protection. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)
-
-
-
|