-
2
-
-
79959563402
-
An Integrated Architecture for Trusted Computing for Java enabled Embedded Devices
-
ACM, New York
-
Dietrich, K.: An Integrated Architecture for Trusted Computing for Java enabled Embedded Devices. In: 2nd ACM workshop on Scalable Trusted Computing - STC 2007, pp. 2-6. ACM, New York (2007)
-
(2007)
2nd ACM workshop on Scalable Trusted Computing
, vol.STC 2007
, pp. 2-6
-
-
Dietrich, K.1
-
3
-
-
37149014768
-
Implementing Embedded Security on Dual-Virtual-CPU Systems
-
Wilson, P., Frey, A., Mihm, T., Kershaw, D., Alves, T.: Implementing Embedded Security on Dual-Virtual-CPU Systems. IEEE Design and Test of Computers 24(6), 582-591 (2007)
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 582-591
-
-
Wilson, P.1
Frey, A.2
Mihm, T.3
Kershaw, D.4
Alves, T.5
-
4
-
-
79959540407
-
A Platform-level Trust-Architecture for Hand-held Devices
-
Leuven, Belgium, p
-
Khan, M.H., Seifert, J.P., Wheeler, D.M., Brizek, J.P.: A Platform-level Trust-Architecture for Hand-held Devices. In: ECRYPT Workshop, CRASH - CRypto-graphic Advances in Secure Hardware, Leuven, Belgium, p. 16 (2005)
-
(2005)
ECRYPT Workshop, CRASH - CRypto-graphic Advances in Secure Hardware
, pp. 16
-
-
Khan, M.H.1
Seifert, J.P.2
Wheeler, D.M.3
Brizek, J.P.4
-
5
-
-
84910156435
-
-
Berger, S., Cáceres, R.., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Berkeley, CA, USA, p. 21. USENIX Association (2006)
-
Berger, S., Cáceres, R.., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Berkeley, CA, USA, p. 21. USENIX Association (2006)
-
-
-
-
6
-
-
79959568144
-
A Trusted Mobile Phone Reference Architecture via Secure Kernel
-
ACM, New York
-
Zhang, X., Aciiçmez, O., Seifert, J.P.: A Trusted Mobile Phone Reference Architecture via Secure Kernel. In: 2nd ACM workshop on Scalable Trusted Computing - STC 2007, pp. 7-14. ACM, New York (2007)
-
(2007)
2nd ACM workshop on Scalable Trusted Computing
, vol.STC 2007
, pp. 7-14
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.P.3
-
8
-
-
54249097318
-
Analyzing trusted platform communication
-
Leuven, Belgium, p
-
Kursawe, K., Schellekens, D., Preneel, B.: Analyzing trusted platform communication. In: ECRYPT Workshop, CRASH - CRyptographic Advances in Secure Hardware, Leuven, Belgium, p. 8 (2005)
-
(2005)
ECRYPT Workshop, CRASH - CRyptographic Advances in Secure Hardware
, pp. 8
-
-
Kursawe, K.1
Schellekens, D.2
Preneel, B.3
-
9
-
-
33846488553
-
A logical approach to NVM integration in SOC design
-
January
-
De Vries, A., Ma, Y.: A logical approach to NVM integration in SOC design. EDN Magazine (2) (January 2007), http://www.impinj.com/pdf/EDN_NVMinSoC. pdf
-
(2007)
EDN Magazine
, vol.2
-
-
De Vries, A.1
Ma, Y.2
-
10
-
-
79959557051
-
Reconfigurable Trusted Computing in Hardware
-
ACM, New York
-
Eisenbarth, T., Güneysu, T., Paar, C., Sadeghi, A.R., Schellekens, D., Wolf, M.: Reconfigurable Trusted Computing in Hardware. In: 2nd ACM workshop on Scalable Trusted Computing - STC 2007, pp. 15-20. ACM, New York (2007)
-
(2007)
2nd ACM workshop on Scalable Trusted Computing
, vol.STC 2007
, pp. 15-20
-
-
Eisenbarth, T.1
Güneysu, T.2
Paar, C.3
Sadeghi, A.R.4
Schellekens, D.5
Wolf, M.6
-
11
-
-
34547208096
-
TCG inside? A Note on TPM Specification Compliance
-
ACM, New York
-
Sadeghi, A.R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: 1st ACM workshop on Scalable Trusted Computing - STC 2006, pp. 47-56. ACM, New York (2006)
-
(2006)
1st ACM workshop on Scalable Trusted Computing
, vol.STC 2006
, pp. 47-56
-
-
Sadeghi, A.R.1
Selhorst, M.2
Stüble, C.3
Wachsmann, C.4
Winandy, M.5
-
13
-
-
38049015807
-
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
0038341105
-
Silicon Physical Unknown Functions
-
Atluri, V, ed, ACM, New York
-
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon Physical Unknown Functions. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security - CCS 2002, pp. 148-160. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, vol.CCS 2002
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.E.2
van Dijk, M.3
Devadas, S.4
-
17
-
-
35248839355
-
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
-
Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
-
Linnartz, J.P.M.G., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.M.G.1
Tuyls, P.2
-
18
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
84944412608
-
Efficient Memory Integrity Verification and Encryption for Secure Processors
-
ACM/IEEE
-
Suh, G.E., Clarke, D.E., Gassend, B., van Dijk, M., Devadas, S.: Efficient Memory Integrity Verification and Encryption for Secure Processors. In: 36th Annual International Symposium on Microarchitecture, pp. 339-350. ACM/IEEE (2003)
-
(2003)
36th Annual International Symposium on Microarchitecture
, pp. 339-350
-
-
Suh, G.E.1
Clarke, D.E.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
20
-
-
47949133300
-
Securing Flash Technology
-
Breveglieri, L, Gueron, S, Koren, I, Naccache, D, Seifert, J.P, eds, IEEE Computer Society, Los Alamitos
-
Handschuh, H., Trichina, E.: Securing Flash Technology. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.) 4th International Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, pp. 3-17. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
4th International Workshop on Fault Diagnosis and Tolerance in Cryptography
, vol.FDTC 2007
, pp. 3-17
-
-
Handschuh, H.1
Trichina, E.2
|