-
1
-
-
68149180414
-
-
3rd Generation Partnership Project (3GPP). 2002. Global System for Mobile Communications (GSM) - Technical Specification Group Services and System Aspects, Sophia Antipolis, France, Personalisation of mobile equipment (ME), Mobile functionality specification (release 5).
-
3rd Generation Partnership Project (3GPP). 2002. Global System for Mobile Communications (GSM) - Technical Specification Group Services and System Aspects, Sophia Antipolis, France, Personalisation of mobile equipment (ME), Mobile functionality specification (release 5).
-
-
-
-
2
-
-
34247885571
-
Intel Virtualization Technology for Directed I=O
-
Abraham, D., J. Jackson, S. Muthrasanallur, G. Neiger, G. Regnier, R. Sankaran, I. Schionas, R. Uhlig, B. Vembu, and J. Wiegert. 2006. "Intel Virtualization Technology for Directed I=O," Intel Technology Journal, 10(3):179-192.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
, pp. 179-192
-
-
Abraham, D.1
Jackson, J.2
Muthrasanallur, S.3
Neiger, G.4
Regnier, G.5
Sankaran, R.6
Schionas, I.7
Uhlig, R.8
Vembu, B.9
Wiegert, J.10
-
3
-
-
1142305232
-
Cryptography and competition policy - Issues with trusted computing
-
July 13-16, Boston, Massachsetts, USA, ACM, pp
-
Anderson, R. 2003. Cryptography and competition policy - Issues with "trusted computing," Proceedings of PODC '03, July 13-16, 2003, Boston, Massachsetts, USA, ACM, pp. 3-10.
-
(2003)
Proceedings of PODC '03
, pp. 3-10
-
-
Anderson, R.1
-
4
-
-
85008038596
-
Improving the TCPA Specification
-
Arbaugh, B. 2002. "Improving the TCPA Specification," IEEE Computer 35(8):77-79.
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 77-79
-
-
Arbaugh, B.1
-
5
-
-
0030672130
-
-
Arbaugh, W. A., D. J. Farber, and J. M. Smith. 1997. A Secure and Reliable Bootstrap Architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997) (Oakland, California, USA). Los Alamitos, California: IEEE Computer Society Press, pp. 65-71.
-
Arbaugh, W. A., D. J. Farber, and J. M. Smith. 1997. A Secure and Reliable Bootstrap Architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997) (Oakland, California, USA). Los Alamitos, California: IEEE Computer Society Press, pp. 65-71.
-
-
-
-
6
-
-
0033887260
-
Computing Platform Security in Cyberspace,
-
5(1):54-63
-
Balacheff, B., L. Chen, S. Pearson, G. Proudler, and D. Chan. 2000. "Computing Platform Security in Cyberspace," Information Security Technical Report, 5(1):54-63.
-
(2000)
Information Security Technical Report
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Proudler, G.4
Chan, D.5
-
7
-
-
0242539792
-
A Trusted Process to Digitally Sign a Document
-
edited by V. Raskin and C. F. Hempelmann. New York, NY: ACM Press, pp
-
Balacheff, B., L. Chen, D. Plaquin, and G. Proudler. 2001. A Trusted Process to Digitally Sign a Document. In Proceedings of the 2001 New Security Paradigms Workshop, edited by V. Raskin and C. F. Hempelmann. New York, NY: ACM Press, pp. 79-86.
-
(2001)
Proceedings of the 2001 New Security Paradigms Workshop
, pp. 79-86
-
-
Balacheff, B.1
Chen, L.2
Plaquin, D.3
Proudler, G.4
-
9
-
-
68149164217
-
Challenges for Trusted Computing
-
Tech. Report RHUL-MA-2008-14, Department of Mathematics, Royal Holloway, University of London
-
Balfe, S., E. Gallery, C. J. Mitchell, and K. G. Paterson. 2008. Challenges for Trusted Computing. Tech. Report RHUL-MA-2008-14, Department of Mathematics, Royal Holloway, University of London.
-
(2008)
-
-
Balfe, S.1
Gallery, E.2
Mitchell, C.J.3
Paterson, K.G.4
-
10
-
-
68149125013
-
Crimeware and Trusted Computing
-
edited by M. Jakobsson and Z. Ramzan. Upper Saddle River, NJ: Addison-Wesley, pp
-
Balfe, S., E. Gallery, C. J. Mitchell, and K. G. Paterson. 2008. Crimeware and Trusted Computing. In Crimeware: Understanding New Attacks and Defenses, edited by M. Jakobsson and Z. Ramzan. Upper Saddle River, NJ: Addison-Wesley, pp. 457-472.
-
(2008)
Crimeware: Understanding New Attacks and Defenses
, pp. 457-472
-
-
Balfe, S.1
Gallery, E.2
Mitchell, C.J.3
Paterson, K.G.4
-
11
-
-
85013594843
-
Securing Peer-to-Peer Networks using Trusted Computing
-
edited by C. J. Mitchell. London: IEE Press, pp
-
Balfe, S., A. D. Lakhani, and K. G. Paterson. 2005. Securing Peer-to-Peer Networks using Trusted Computing. In Trusted Computing edited by C. J. Mitchell. London: IEE Press, pp. 271-298.
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
12
-
-
68149178144
-
Augmenting internet-based card notpresent transactions with trusted computing: An analysis
-
Tech. Report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London
-
S. Balfe and K. G. Paterson. 2005. Augmenting internet-based card notpresent transactions with trusted computing: An analysis. Tech. Report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London.
-
(2005)
-
-
Balfe, S.1
Paterson, K.G.2
-
13
-
-
68149183122
-
-
Balfe, S. and K. G. Paterson. 2005. e-EMV: Emulating EMV for internet payments using trusted computing technology. Tech. Report RHUL-MA-2006-10, Department of Mathematics, Royal Holloway, University of London.
-
Balfe, S. and K. G. Paterson. 2005. e-EMV: Emulating EMV for internet payments using trusted computing technology. Tech. Report RHUL-MA-2006-10, Department of Mathematics, Royal Holloway, University of London.
-
-
-
-
14
-
-
21644433634
-
XEN and the art of virtualization
-
Bolton Landing, New York, USA, 19-22 October, New York: ACM Press, pp
-
Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. 2003. XEN and the art of virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), Bolton Landing, New York, USA, 19-22 October 2003. New York: ACM Press, pp. 164-177.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauery, R.7
Pratt, I.8
Warfield, A.9
-
15
-
-
68149180413
-
-
Brickell, E., J. Camenisch, and L. Chen. June 2004. Direct anonymous attestation, Tech. Report HPL-2004-93, Hewlett-Packard Laboratories, Available at http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009)
-
Brickell, E., J. Camenisch, and L. Chen. June 2004. Direct anonymous attestation, Tech. Report HPL-2004-93, Hewlett-Packard Laboratories, Available at http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009)
-
-
-
-
16
-
-
14844295011
-
Direct Anonymous Attestation
-
edited by B. Pfitzmann and P. Liu. ACM Press, pp
-
Brickell, E., J. Camenisch, and L. Chen. 2004. Direct Anonymous Attestation. In Proceedings of CCS '04, edited by B. Pfitzmann and P. Liu. ACM Press, pp. 132-145.
-
(2004)
Proceedings of CCS '04
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
17
-
-
85013604515
-
The DAA scheme in context
-
edited by C. J. Mitchell. London: IEE Press, pp
-
Brickell, E., J. Camenisch, and L. Chen. 2005. The DAA scheme in context. In Trusted Computing, edited by C. J. Mitchell. London: IEE Press, pp. 143-174.
-
(2005)
Trusted Computing
, pp. 143-174
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
18
-
-
35048847167
-
Better privacy for trusted computing platforms (extended abstract). Computer Security - ESORICS 2004
-
9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, P. Samarati, D. Gollmann, and R. Molva, eds, Berlin: Springer-Verlag
-
Camenisch, J. 2004. Better privacy for trusted computing platforms (extended abstract). Computer Security - ESORICS 2004, 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, In P. Samarati, D. Gollmann, and R. Molva, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 3193 pp. 73-88.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 73-88
-
-
Camenisch, J.1
-
19
-
-
35348963573
-
Daonity - Grid Security from Two Levels of Virtualisation,
-
12(3):123-138
-
Chen, H., J. Chen, W. Mao, and F. Yan. 2007. "Daonity - Grid Security from Two Levels of Virtualisation," Information Security Technical Report, 12(3):123-138.
-
(2007)
Information Security Technical Report
-
-
Chen, H.1
Chen, J.2
Mao, W.3
Yan, F.4
-
20
-
-
38049010311
-
How can you trust a computing platform?
-
Barcelona: ISSE
-
Chen, L., S. Pearson, G. Proudler,D. Chan, and B. Balacheff. 2000.How can you trust a computing platform? In Proceedings of Information Security Solutions Europe. Barcelona: ISSE.
-
(2000)
Proceedings of Information Security Solutions Europe
-
-
Chen, L.1
Pearson, S.2
Proudler, G.3
Chan, D.4
Balacheff, B.5
-
21
-
-
0033659712
-
On Enhancing Biometric Authentication with Data Protection
-
edited by R. J. Howlett and L. C. Jain. New York, NY: IEEE
-
Chen, L., S. Pearson, and A. Vamvakas. 2000. On Enhancing Biometric Authentication with Data Protection. In Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, edited by R. J. Howlett and L. C. Jain. New York, NY: IEEE, Vol. 1, pp. 249-252.
-
(2000)
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies
, vol.1
, pp. 249-252
-
-
Chen, L.1
Pearson, S.2
Vamvakas, A.3
-
22
-
-
0028533131
-
BITS: A smartcard protected operating system
-
P. C. Clark and L. J. Hoffman. 1994. "BITS: A smartcard protected operating system," Communications of the ACM, 37:66-94.
-
(1994)
Communications of the ACM
, vol.37
, pp. 66-94
-
-
Clark, P.C.1
Hoffman, L.J.2
-
23
-
-
33751081043
-
Towards a Secure, Tamper-Proof Grid Platform
-
Singapore, May, New York, NY: IEEE Press, pp
-
A. Cooper and A. Martin. 2006. Towards a Secure, Tamper-Proof Grid Platform. In Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid. Singapore, May 2006, New York, NY: IEEE Press, pp. 373-380.
-
(2006)
Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid
, pp. 373-380
-
-
Cooper, A.1
Martin, A.2
-
24
-
-
34547468412
-
Towards an Open, Trusted Digital Rights Management Platform
-
Alexandria, Virginia, USA, October 30, ACM Press, pp
-
A. Cooper and A. Martin. 2006. Towards an Open, Trusted Digital Rights Management Platform. In Proceedings of the ACM Workshop on Digital Rights Management (DRM '06), Alexandria, Virginia, USA, October 30, 2006, ACM Press, pp. 79-88.
-
(2006)
Proceedings of the ACM Workshop on Digital Rights Management (DRM '06)
, pp. 79-88
-
-
Cooper, A.1
Martin, A.2
-
25
-
-
35248895553
-
Privacy preserving trust agents
-
Tech. Report HPL-2004-197, Bristol, UK: Hewlett-Packard Laboratories
-
Crane, S. 2004. Privacy preserving trust agents. Tech. Report HPL-2004-197, Bristol, UK: Hewlett-Packard Laboratories.
-
(2004)
-
-
Crane, S.1
-
27
-
-
68149099360
-
-
EMVCo. 2004. Book 1, Application independent ICC to terminal interface requirements. Version 4.1
-
EMVCo. 2004. Book 1 - Application independent ICC to terminal interface requirements. Version 4.1.
-
-
-
-
28
-
-
68149100324
-
-
EMVCo. Book 2, Security and Key Management. Version 4.1
-
EMVCo. Book 2 - Security and Key Management. Version 4.1.
-
-
-
-
30
-
-
68149184032
-
-
EMVCo. Book 4, Cardholder, Attendant, and Acquirer Interface Requirements. Version 4.1
-
EMVCo. Book 4 - Cardholder, Attendant, and Acquirer Interface Requirements. Version 4.1.
-
-
-
-
31
-
-
0042349623
-
A Trusted Open Platform
-
England, P., B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. 2003. "A Trusted Open Platform," IEEE Computer, 36(7):55-62.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
32
-
-
84947424562
-
-
England, P. and M. Peinado. 2002. Authenticated operation of open computing devices. Information Security and Privacy, 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, In L. Batten and J. Seberry, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 346-361.
-
England, P. and M. Peinado. 2002. Authenticated operation of open computing devices. Information Security and Privacy, 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, In L. Batten and J. Seberry, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 346-361.
-
-
-
-
34
-
-
38049038742
-
Authorisation issues for mobile code in mobile systems
-
Tech. Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London
-
Gallery, E. 2007. Authorisation issues for mobile code in mobile systems. Tech. Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London.
-
(2007)
-
-
Gallery, E.1
-
35
-
-
68149160671
-
-
Gallery, E. and A. Tomlinson. 2005. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), (Orange County, California, USA), Software Defined Radio Forum (SDRF).
-
Gallery, E. and A. Tomlinson. 2005. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), (Orange County, California, USA), Software Defined Radio Forum (SDRF).
-
-
-
-
36
-
-
85013580835
-
Secure delivery of conditional access applications to mobile receivers
-
edited by C. J. Mitchell. London, UK: The Institute of Electrical Engineers IEE, pp
-
Gallery, E. and A. Tomlinson. 2005. Secure delivery of conditional access applications to mobile receivers. In Trusted Computing, edited by C. J. Mitchell. London, UK: The Institute of Electrical Engineers (IEE), pp. 195-238.
-
(2005)
Trusted Computing
, pp. 195-238
-
-
Gallery, E.1
Tomlinson, A.2
-
37
-
-
78650880166
-
Flexible OS support and applications for trusted computing
-
Lihue, May 18-21. Berkeley, CA: USA: USENIX Association, pp
-
Garfinkel, T., M. Rosenblum, and D. Boneh. 2003. Flexible OS support and applications for trusted computing. In Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems, Lihue, May 18-21. Berkeley, CA: USA: USENIX Association, pp. 145-150.
-
(2003)
Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems
, pp. 145-150
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
38
-
-
0036684150
-
PKI: It's Not Dead, Just Resting
-
Gutmann, P. 2002. "PKI: It's Not Dead, Just Resting," IEEE Computer 35(8):41-49.
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
39
-
-
24944584954
-
LaGrande technology architectural overview
-
Intel, Tech. Report 252491-001, Intel Corporation
-
Intel. 2003. LaGrande technology architectural overview. Tech. Report 252491-001, Intel Corporation.
-
(2003)
-
-
-
42
-
-
84958776015
-
-
Itoi, N., W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. 2001. Personal secure booting. Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings. In V. Varadharajan and Y. Mu, eds., Lecture Notes in Computer Science Berlin: Springer-Verlag, 2119, pp. 130-144.
-
Itoi, N., W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. 2001. Personal secure booting. Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings. In V. Varadharajan and Y. Mu, eds., Lecture Notes in Computer Science Berlin: Springer-Verlag, Vol. 2119, pp. 130-144.
-
-
-
-
43
-
-
84955566566
-
-
Kinateder, M. and S. Pearson. 2003. A privacy-enhanced peer-to-peer reputation system. E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 206-216.
-
Kinateder, M. and S. Pearson. 2003. A privacy-enhanced peer-to-peer reputation system. E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 206-216.
-
-
-
-
44
-
-
38049026664
-
-
Accessed May 20, 2009
-
Kuhlmann, D., R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. 2006. An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement, www.opentc.net. (Accessed May 20, 2009)
-
(2006)
An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
45
-
-
68149170354
-
On a possible privacy flaw in Direct Anonymous Attestation (DAA)
-
Tech. Report RHUL-MA-2007-10, Mathematics Department, Royal Holloway, University of London
-
Leung, A., L. Chen, and C. J. Mitchell. 2007. On a possible privacy flaw in Direct Anonymous Attestation (DAA). Tech. Report RHUL-MA-2007-10, Mathematics Department, Royal Holloway, University of London.
-
(2007)
-
-
Leung, A.1
Chen, L.2
Mitchell, C.J.3
-
46
-
-
27544437127
-
-
Ph.D. thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA, December
-
Lie, D. 2003. Architectural support for copy and tamper resistant software, Ph.D. thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA, December 2003.
-
(2003)
Architectural support for copy and tamper resistant software
-
-
Lie, D.1
-
47
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
ASPLOS-IX, Cambridge, MA, New York: ACM Press, pp
-
Lie, D., C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. 2000. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, (ASPLOS-IX), Cambridge, MA, New York: ACM Press, pp. 169-177.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 169-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
48
-
-
38049040255
-
Enhancing Grid security using trusted virtualization
-
Proceedings of the 4th International Conference on Autonomic and Trusted Computing ATC, Berlin: Springer-Verlag
-
Löhr, H., H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and C. Stüble. 2007. Enhancing Grid security using trusted virtualization. Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 4610, pp. 372-384.
-
(2007)
Lecture Notes in Computer Science
, vol.4610
, pp. 372-384
-
-
Löhr, H.1
Ramasamy, H.V.2
Sadeghi, A.-R.3
Schulz, S.4
Schunter, M.5
Stüble, C.6
-
51
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
August, 2007
-
McCune, J., A. Perrig, A. Seshadri, and L. van Doorn. 2007. Turtles all the way down: Research challenges in user-based attestation. Proceedings of 2nd USENIX Workshop on Hot Topics in Security (HotSec 2007), August 2007.
-
(2007)
Proceedings of 2nd USENIX Workshop on Hot Topics in Security (HotSec
-
-
McCune, J.1
Perrig, A.2
Seshadri, A.3
van Doorn, L.4
-
52
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
September 1-5, Prague, Czech Republic: IEEE Computer Society, pp
-
Mont, M. C., S. Pearson, and P. Bramhall. 2003. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 1-5, 2003, Prague, Czech Republic: IEEE Computer Society, pp. 377-382.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA '03)
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
53
-
-
0142250282
-
Towards accountable management of privacy and identity information. Computer Security - ESORICS 2003
-
8th European Symposium on Research in Computer Security, Gjövik, Norway, October 13-15, 2003, Proceedings, In E. Snekkenes and D. Gollmann, eds, Berlin: Springer-Verlag
-
Mont, M. C., S. Pearson, and P. Bramhall. 2003. Towards accountable management of privacy and identity information. Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjövik, Norway, October 13-15, 2003, Proceedings. (In E. Snekkenes and D. Gollmann, eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 2808, pp. 146-161.
-
(2003)
Lecture Notes in Computer Science
, vol.2808
, pp. 146-161
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
56
-
-
68149164033
-
-
The Open Mobile Alliance. 2004. DRM architecture v2.0. July 2004, San Diego: OMA.
-
The Open Mobile Alliance. 2004. DRM architecture v2.0. July 2004, San Diego: OMA.
-
-
-
-
57
-
-
35048827792
-
-
A. Pashalidis and C. J. Mitchell. 2003. Single sign-on using trusted platforms. Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. In C. Boyd and W. Mao, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2851, pp. 54-68.
-
A. Pashalidis and C. J. Mitchell. 2003. Single sign-on using trusted platforms. Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. In C. Boyd and W. Mao, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 2851, pp. 54-68.
-
-
-
-
58
-
-
2442419307
-
Trusted Agents that Enhance user Privacy by Self-Profiling
-
Tech. Report HPL-2002-196, Bristol, UK: Hewlett-Packard Laboratories, July
-
Pearson, S. 2002. Trusted Agents that Enhance user Privacy by Self-Profiling. Tech. Report HPL-2002-196, Bristol, UK: Hewlett-Packard Laboratories, July 2002.
-
(2002)
-
-
Pearson, S.1
-
60
-
-
17644388294
-
Trusted computing platforms, the Next security solution
-
Pearson, S. ed, Tech. Report HPL-2002-221, Hewlett-Packard Laboratories, November, Accessed May 20, 2009
-
Pearson, S. ed. 2002. Trusted computing platforms, the Next security solution. Tech. Report HPL-2002-221, Hewlett-Packard Laboratories, November 2002, http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009).
-
(2002)
-
-
-
62
-
-
33646445517
-
-
Peinado, M., Y. Chen, P. England, and J. Manferdelli. 2004. NGSCB: A trusted open system. Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings. In H. Wang, J. Pieprzyk, and V. Varadharajan, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 3108, pp. 86-97.
-
Peinado, M., Y. Chen, P. England, and J. Manferdelli. 2004. NGSCB: A trusted open system. Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings. In H. Wang, J. Pieprzyk, and V. Varadharajan, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 3108, pp. 86-97.
-
-
-
-
63
-
-
85013587012
-
An overview of NGSCB, Trusted Computing
-
edited by C. J. Mitchell. London: The Institute of Electrical Engineers IEE, pp
-
Peinado, M., P. England, and Y. Chen. 2005. An overview of NGSCB, Trusted Computing. In IEE Professional Applications of Computing Series 6, edited by C. J. Mitchell. London: The Institute of Electrical Engineers (IEE), pp. 115-141.
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
, pp. 115-141
-
-
Peinado, M.1
England, P.2
Chen, Y.3
-
64
-
-
0013347999
-
The PERSEUS system architecture
-
3335, 93381, IBM Research Division, Zurich Laboratory, April
-
Pfitzmann, B., J. Riordan, C. Stuble, M. Waidner, and A. Weber. 2001. The PERSEUS system architecture. Tech. Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, April 2001.
-
(2001)
Tech. Report RZ
-
-
Pfitzmann, B.1
Riordan, J.2
Stuble, C.3
Waidner, M.4
Weber, A.5
-
65
-
-
33750903968
-
PKI - An insider's view (extended abstract)
-
Technical Report RHULMA-2005-8, Department of Mathematics, Royal Holloway, University of London, June
-
Price, G. 2005. PKI - An insider's view (extended abstract). Technical Report RHULMA-2005-8, Department of Mathematics, Royal Holloway, University of London, June 2005.
-
(2005)
-
-
Price, G.1
-
67
-
-
84942771624
-
Privacy and trusted computing
-
September 1-5, Prague, Czech Republic, IEEE Computer Society, pp
-
Reid, J., J. M. Gonzalez Nieto, and E. Dawson. 2003. Privacy and trusted computing. 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 1-5, 2003, Prague, Czech Republic, IEEE Computer Society, pp. 383-388.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA '03)
, pp. 383-388
-
-
Reid, J.1
Gonzalez Nieto, J.M.2
Dawson, E.3
-
68
-
-
36248950111
-
-
Rudolph, C. 2007. Covert identity information in Direct Anonymous Attestation (DAA), New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. In H. Venter, M. Eloff, L. Lebuschagne, J. Eloff, and R. von Solms, eds., IFIP International Federation for Information Processing, Boston: Springer, 232, pp. 443-448.
-
Rudolph, C. 2007. Covert identity information in Direct Anonymous Attestation (DAA), New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. In H. Venter, M. Eloff, L. Lebuschagne, J. Eloff, and R. von Solms, eds., IFIP International Federation for Information Processing, Boston: Springer, Vol. 232, pp. 443-448.
-
-
-
-
69
-
-
34547208096
-
TCG inside? a note on TPM specification compliance
-
Alexandria, Virginia, USA, New York: ACM, pp
-
Sadeghi, A.-R., M. Selhorst, C. Stüble, C. Wachsmann, and M. Winandy. 2006. TCG inside? a note on TPM specification compliance, Proceedings of the 1st ACM workshop on Scalable trusted computing (STC 2006) (Alexandria, Virginia, USA), New York: ACM, pp. 47-56.
-
(2006)
Proceedings of the 1st ACM workshop on Scalable trusted computing (STC 2006)
, pp. 47-56
-
-
Sadeghi, A.-R.1
Selhorst, M.2
Stüble, C.3
Wachsmann, C.4
Winandy, M.5
-
70
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
C. F. Hempelmann, ed, New York: ACM, pp
-
Sadeghi, A.-R. and C. Stüble. 2004. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In C. F. Hempelmann, ed., Proceedings of the 2004 Workshop on New Security Paradigms (NSPW 2004). New York: ACM, pp. 67-77.
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms (NSPW 2004)
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
71
-
-
35048881059
-
-
Sadeghi, A.-R. and C. Stüble. 2004. Taming trusted platforms by operating system design. Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. In K. Chae and M. Yung, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2908, pp. 286-302.
-
Sadeghi, A.-R. and C. Stüble. 2004. Taming "trusted platforms" by operating system design. Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. In K. Chae and M. Yung, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 2908, pp. 286-302.
-
-
-
-
73
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
E. Ferrari and G.-J. Ann, eds, New York: ACM, pp
-
Sandhu, R. and X. Zhang. 2005. Peer-to-peer access control architecture using trusted computing technology. In E. Ferrari and G.-J. Ann, eds., Proceedings of the 10th ACM symposium on Access control models and technologies (SACMAT 2005). New York: ACM, pp. 147-158.
-
(2005)
Proceedings of the 10th ACM symposium on Access control models and technologies (SACMAT 2005)
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
74
-
-
68149157835
-
-
Schechter, S. E., R. A. Greenstadt, and M. D. Smith. 2003. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In Proceedings of the Second Annual Workshop on Economics and Information Security. College Park, MD, May 29-30.
-
Schechter, S. E., R. A. Greenstadt, and M. D. Smith. 2003. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In Proceedings of the Second Annual Workshop on Economics and Information Security. College Park, MD, May 29-30.
-
-
-
-
75
-
-
38149070279
-
-
Smyth, B., M. Ryan, and L. Chen. 2007. Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings In F. Stajano, C. Meadows, S. Capkun, and T. Moore, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, 4572, pp. 218-231.
-
Smyth, B., M. Ryan, and L. Chen. 2007. Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings In F. Stajano, C. Meadows, S. Capkun, and T. Moore, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 4572, pp. 218-231.
-
-
-
-
77
-
-
84904269073
-
Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP=Sec '01), June 11-13, 2001, Paris, France
-
M. Dupuy and P. Paradinas, eds, Boston: Kluwer Academic Publishers
-
Spalka, A., A. B. Cremers, and H. Langweg. 2001. Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP=Sec '01), June 11-13, 2001, Paris, France. In M. Dupuy and P. Paradinas, eds., IFIP Conference Proceedings. Boston: Kluwer Academic Publishers, Vol. 193, pp. 403-419.
-
(2001)
IFIP Conference Proceedings
, vol.193
, pp. 403-419
-
-
Spalka, A.1
Cremers, A.B.2
Langweg, H.3
-
78
-
-
43649103310
-
A security assessment of trusted platform modules
-
Tech. Report TR-2007-597, Department of Computer Science, Dartmouth College, Jun
-
Sparks, E. 2007. A security assessment of trusted platform modules. Tech. Report TR-2007-597, Department of Computer Science, Dartmouth College, Jun 2007.
-
(2007)
-
-
Sparks, E.1
-
79
-
-
1142280988
-
The AEGIS processor architecture for tamper-evident and tamper-resistant processing
-
23-26 June, San Francisco, California, USA, New York: ACM Press, pp
-
Suh, E., D. Clarke, B. Gassend, M. van Dyke, and S. Devadas. 2003. The AEGIS processor architecture for tamper-evident and tamper-resistant processing, In 17th Annual ACM International Conference on Supercomputing (ICS '03) 23-26 June 2003, San Francisco, California, USA, New York: ACM Press, pp. 160-171.
-
(2003)
17th Annual ACM International Conference on Supercomputing (ICS '03)
, pp. 160-171
-
-
Suh, E.1
Clarke, D.2
Gassend, B.3
van Dyke, M.4
Devadas, S.5
-
80
-
-
68149125004
-
-
Trusted Computing Group. 2005. Mobile Phone Working Group, Portland. OR, Use case scenarios, September 2005, Version 2.7
-
Trusted Computing Group. 2005. Mobile Phone Working Group, Portland. OR, Use case scenarios, September 2005, Version 2.7.
-
-
-
-
81
-
-
68149100325
-
-
Trusted Computing Group (TCG). 2005. Portland, OR, TCG PC client specific implementation specification for conventional BIOS July 2005, Version 1.2 Final.
-
Trusted Computing Group (TCG). 2005. Portland, OR, TCG PC client specific implementation specification for conventional BIOS July 2005, Version 1.2 Final.
-
-
-
-
82
-
-
68149180142
-
-
Trusted Computing Group (TCG). 2006. Beaverton, OR, Mobile trusted module specification overview document.
-
Trusted Computing Group (TCG). 2006. Beaverton, OR, Mobile trusted module specification overview document.
-
-
-
-
83
-
-
68149171249
-
-
Trusted Computing Group TCG, 2006. Portland, OR, TCG EFI platform, for TPM family 1.1 or 1.2 June 2006, Version 1.2 Final
-
Trusted Computing Group (TCG). 2006. Portland, OR, TCG EFI platform - for TPM family 1.1 or 1.2 June 2006, Version 1.2 Final.
-
-
-
-
84
-
-
68149163045
-
-
Trusted Computing Group (TCG). 2006. Portland, OR, The TCG mobile trusted module specification September 2006.
-
Trusted Computing Group (TCG). 2006. Portland, OR, The TCG mobile trusted module specification September 2006.
-
-
-
-
85
-
-
68149156847
-
-
Trusted Computing Group TCG, 2006. Portland, OR, TPM main, Part 1: Design principles March 2006, Version 1.2 Revision 94
-
Trusted Computing Group (TCG). 2006. Portland, OR, TPM main, Part 1: Design principles March 2006, Version 1.2 Revision 94.
-
-
-
-
86
-
-
68149160670
-
-
Trusted Computing Group TCG, 2006. Portland, OR, TPM main, Part 2: TPM data structures March 2006, Version 1.2 Revision 94
-
Trusted Computing Group (TCG). 2006. Portland, OR, TPM main, Part 2: TPM data structures March 2006, Version 1.2 Revision 94.
-
-
-
-
87
-
-
68149165256
-
-
Trusted Computing Group TCG, 2006. Portland, OR, TPM Main, Part 3: Commands March 2006, Version 1.2 Revision 94
-
Trusted Computing Group (TCG). 2006. Portland, OR, TPM Main, Part 3: Commands March 2006, Version 1.2 Revision 94.
-
-
-
-
88
-
-
68149173239
-
-
Trusted Computing Group TCG, 2007. Portland, OR, TCG credential profiles May 2007, Version 1.1 Revision 1.014 For TPM Family 1, 2; Level 2
-
Trusted Computing Group (TCG). 2007. Portland, OR, TCG credential profiles May 2007, Version 1.1 Revision 1.014 For TPM Family 1, 2; Level 2.
-
-
-
-
89
-
-
68149125977
-
-
Trusted Computing Group (TCG). 2007. Portland, OR, TNC architecture for interoperability September 2007.
-
Trusted Computing Group (TCG). 2007. Portland, OR, TNC architecture for interoperability September 2007.
-
-
-
-
90
-
-
0038650651
-
Dyad: A system for using physically secure coprocessors
-
Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, PA, May
-
Tygar, J. and B. Yee. 1991. Dyad: A system for using physically secure coprocessors, Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, PA, May 1991.
-
(1991)
-
-
Tygar, J.1
Yee, B.2
-
91
-
-
33646754186
-
Finding collisions in the full SHA-1 Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005
-
Proceedings, V. Shoup, ed, Berlin: Springer
-
Wang, X., Y. L. Yin, and X. Yu. 2005. Finding collisions in the full SHA-1 Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. In V. Shoup, ed., Lecture Notes in Computer Science. Berlin: Springer, vol. 3621, pp. 17-36.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, X.3
-
92
-
-
84982994321
-
Introducing trusted third parties to the mobile agent paradigm. Secure Internet Programming: Security Issues for Mobile and Distributed Objects
-
J. Vitek and C. Jensen, eds, Berlin: Springer-Verlag
-
Wilhelm, U. G., S. Staamann, and L. Butty. 1999. Introducing trusted third parties to the mobile agent paradigm. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. In J. Vitek and C. Jensen, eds., Lecture Notes In Computer Science. Berlin: Springer-Verlag, vol. 1603, pp. 469-489.
-
(1999)
Lecture Notes In Computer Science
, vol.1603
, pp. 469-489
-
-
Wilhelm, U.G.1
Staamann, S.2
Butty, L.3
-
93
-
-
24944497930
-
A method for trust sustainability among trusted computing platforms. Trust and Privacy in Digital Business: First International Conference, Trust-Bus 2004, Zaragoza, Spain, August 30 - September 1, 2004
-
Proceedings, S. Katsikas, J. Lopez, and G. Pernul, eds, Berlin: Springer- Verlag
-
Yan, Z. and Z. Cofta. 2004. A method for trust sustainability among trusted computing platforms. Trust and Privacy in Digital Business: First International Conference, Trust-Bus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings. In S. Katsikas, J. Lopez, and G. Pernul, eds., Lecture Notes in Computer Science. Berlin: Springer- Verlag, Vol. 3184, pp. 11-19.
-
(2004)
Lecture Notes in Computer Science
, vol.3184
, pp. 11-19
-
-
Yan, Z.1
Cofta, Z.2
-
94
-
-
47749138230
-
Using trusted computing in commercial grids
-
B. Akhgar, ed, Sheffield, UK, July 22-27, Berlin: Springer-Verlag, pp
-
Yau, P.-W. and A. Tomlinson. 2007. Using trusted computing in commercial grids. In B. Akhgar, ed., Proceedings of the 15th International Workshop on Conceptual Structures (ICCS 2007), Sheffield, UK, July 22-27, 2007. Berlin: Springer-Verlag, pp. 31-36.
-
(2007)
Proceedings of the 15th International Workshop on Conceptual Structures (ICCS 2007)
, pp. 31-36
-
-
Yau, P.-W.1
Tomlinson, A.2
|