-
1
-
-
70249091695
-
Study on facilitation of machine-to-machine communication in 3GPP systems
-
3rd Generation Partnership Project (3GPP) Mar.
-
3rd Generation Partnership Project (3GPP). (2007, Mar.). Study on facilitation of machine-to-machine communication in 3GPP systems. 3GPP Tech. Rep. 22.868, version 8.0.0 [Online]. Available: ftp:// ftp.3gpp.org/Specs/ archive/22-series/22.868/22868-800.zip
-
(2007)
3GPP Tech. Rep. 22.868, Version 8.0.0 [Online]
-
-
-
2
-
-
84869633168
-
Feasibility study on remote management of USIM application on M2M equipment
-
3rd Generation Partnership Project (3GPP) May
-
3rd Generation Partnership Project (3GPP). (2007, May). Feasibility study on remote management of USIM application on M2M equipment. 3GPP Tech. Rep. 33.812, unpublished draft version 1.4.0 [Online]. Available: ftp://ftp.3gpp.org/tsg-sa/WG3-Security/TSGS3- 55-Shanghai/Docs/S3-091154.zip
-
(2007)
3GPP Tech. Rep. 33.812, Unpublished Draft Version 1.4.0 [Online]
-
-
-
5
-
-
84885029991
-
Implementation of a trusted ticket system
-
Boston, MA, to be published
-
A. Leicher, N. Kuntze, and A. U. Schmidt, "Implementation of a trusted ticket system," in Proc. IFIP Int. Information Security Conf. SEC2009, Boston, MA, to be published.
-
Proc. IFIP Int. Information Security Conf. SEC2009
-
-
Leicher, A.1
Kuntze, N.2
Schmidt, A.U.3
-
6
-
-
14844295011
-
Direct anonymous attestation
-
E. Brickell, J. Camenisch, and L. Chen, "Direct anonymous attestation," in Proc. 11th ACM Conf. Computer and Communications Security, 2004, pp. 132-145.
-
(2004)
Proc. 11th ACM Conf. Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Commun. ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
70349659108
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
V. Haldar, D. Chandra, and M. Franz, "Semantic remote attestation: A virtual machine directed approach to trusted computing," in Proc. USENIX Virtual Machine Research and Technology Symp. (VM '04), 2004, pp. 29-41.
-
(2004)
Proc. USENIX Virtual Machine Research and Technology Symp. (VM '04)
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
10
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
A.-R. Sadeghi and Ch. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," in Proc. 2004 Workshop on New Security Paradigms NSPW '04, 2004, pp. 67-77
-
(2004)
Proc. 2004 Workshop on New Security Paradigms NSPW '04
, pp. 67-77
-
-
Sadeghi, A.-R.1
Chen, L.2
-
11
-
-
34547196300
-
A protocol for property-based attestation
-
L. Chen, R. Landfermann, H. Lohr, M. Rohe, A.-R. Sadeghi, Ch. Stüble, and H. Gortz, "A protocol for property-based attestation," in Proc. 1st ACM Workshop on Scalable Trusted Computing (STC '06), 2006, pp. 7-16.
-
(2006)
Proc. 1st ACM Workshop on Scalable Trusted Computing (STC '06)
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Lohr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, Ch.6
Gortz, H.7
-
12
-
-
84869623707
-
TNC architecture for interoperability
-
Trusted Computing Group (TCG), Revision 6 [Online]
-
Trusted Computing Group (TCG). (2006). TNC architecture for interoperability. TCG Specification Version 1.3, Revision 6 [Online]. Available: http://www.trustedcomputinggroup.org/resources/tnc-architecture-for- interoperability-version-1 3
-
(2006)
TCG Specification Version 1.3
-
-
-
13
-
-
84869609906
-
TCG infrastructure work ing group, architecture-Part II-Integrity management
-
Trusted Computing Group (TCG), Revision 1.0 [Online]
-
Trusted Computing Group (TCG). (2008). TCG infrastructure work ing group, architecture-Part II-Integrity management. TCG Specifi cation Version 1.0, Revision 1.0 [Online]. Available: http://www. trustedcomputinggroup.org/ resources/infrastructure-work-group- architecture-part-ii integrity-management- version-10
-
(2008)
TCG Specification Version 1.0
-
-
-
14
-
-
70249125685
-
Scaling concepts between trust and enforcement
-
Z. Yan, Ed. Hershey, PA: IGI Global, to be published
-
A. U. Schmidt, A. Leicher, and I. Cha, "Scaling concepts between trust and enforcement," in Trust Modeling and Management in Digital Environments: From Social Concept to System Development, Z. Yan, Ed. Hershey, PA: IGI Global, to be published.
-
Trust Modeling and Management in Digital Environments: From Social Concept to System Development
-
-
Schmidt, A.U.1
Leicher, A.2
Cha, I.3
-
15
-
-
0012446629
-
Generic AAA architecture
-
C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence, "Generic AAA architecture," Internet Engineering Task Force Network Working Group, Request for Comment (RFC) 2903, 2000.
-
(2000)
Internet Engineering Task Force Network Working Group, Request for Comment (RFC) 2903
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
16
-
-
84885397625
-
Secu rity and trust for M2M communications
-
Paris, France
-
I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. Meyerstein, "Secu rity and trust for M2M communications," presented at WWRF Meet ing 22, Paris, France, 2009.
-
(2009)
WWRF Meeting 22
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.U.3
Leicher, A.4
Meyerstein, M.5
|