-
1
-
-
33845936084
-
A Logical Account of NGSCB
-
Proceedings of the 24th International Conference on Formal Techniques for Networked and Distributed Systems, of, Springer Verlag
-
M. Abadi and T. Wobber. A Logical Account of NGSCB. In Proceedings of the 24th International Conference on Formal Techniques for Networked and Distributed Systems, volume 3235 of LNCS, pages 1-12. Springer Verlag, 2004.
-
(2004)
LNCS
, vol.3235
, pp. 1-12
-
-
Abadi, M.1
Wobber, T.2
-
4
-
-
70349245980
-
-
AMD. AMD64 architecture programmer's manual: 2: System programming, AMD Publication no. 24594 rev. 3.11 edition, 2006.
-
AMD. AMD64 architecture programmer's manual: Volume 2: System programming, AMD Publication no. 24594 rev. 3.11 edition, 2006.
-
-
-
-
6
-
-
84869614431
-
-
APACS, April 2007
-
APACS. Card Fraud The Facts 2007. http://www.apacs.org.uk/, April 2007.
-
Card Fraud The Facts 2007
-
-
-
7
-
-
0242613144
-
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology
-
Kluwer Academic
-
B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. In Proceedings of the 4th working Smart Card Research and Advanced Applications, pages 177-195. Kluwer Academic, 2001.
-
(2001)
Proceedings of the 4th working Smart Card Research and Advanced Applications
, pp. 177-195
-
-
Balacheff, B.1
Chan, D.2
Chen, L.3
Pearson, S.4
Proudler, G.5
-
8
-
-
85013594843
-
Securing Peer-to-Peer networks using Trusted Computing
-
C.J. Mitchell, editor, IEE Press
-
S. Balfe, A.D. Lakhani, and K.G. Paterson. Securing Peer-to-Peer networks using Trusted Computing. In C.J. Mitchell, editor, Trusted Computing, pages 271-298. IEE Press, 2005.
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
9
-
-
68149178144
-
Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
-
Technical report, Technical report RHUL-MA-2006-9-v2, Department of Mathematics, Royal Holloway, University of London
-
S. Balfe and K.G. Paterson. Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis. Technical report, Technical report RHUL-MA-2006-9-v2, (Department of Mathematics, Royal Holloway, University of London). http://www.rhul.ac.uk/mathematics/techreports.
-
-
-
Balfe, S.1
Paterson, K.G.2
-
10
-
-
21644433634
-
XEN and the Art of Virtualization
-
ACM Press
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. XEN and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 164-177. ACM Press, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauery, R.7
Pratt, I.8
Warfield, A.9
-
12
-
-
84869635538
-
-
PCI Security Standards Council. Payment Card Industry Data Security Standard, Version 1.1, 2006
-
PCI Security Standards Council. Payment Card Industry Data Security Standard - Version 1.1. https://www.pcisecuritystandards.org/, 2006.
-
-
-
-
15
-
-
70349247369
-
-
EMVCo. EMV Specifications Version 4.1. http://www.emvco.com, June 2004.
-
EMVCo. EMV Specifications Version 4.1. http://www.emvco.com, June 2004.
-
-
-
-
16
-
-
34548150723
-
Compartmented Security for Browsers-Or How to Thwart a Phisher with Trusted Computing
-
IEEE Computer Society
-
S. Gajek, A-R. Sadeghi, C. Stüble, and M. Winandy. Compartmented Security for Browsers-Or How to Thwart a Phisher with Trusted Computing. In Proceedings of the 2nd International Conference on Availability, Reliability and Security, pages 120-127. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the 2nd International Conference on Availability, Reliability and Security
, pp. 120-127
-
-
Gajek, S.1
Sadeghi, A.-R.2
Stüble, C.3
Winandy, M.4
-
18
-
-
79952612270
-
Beyond Secure Channels
-
ACM Press
-
Y. Gasmi, A-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond Secure Channels. In Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pages 30-40. ACM Press, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
24
-
-
70349241179
-
-
C. Jackson, D. Boneh, and J. Mitchell. Attack of the transaction generators. http: //crypto.stanford.edu/SpyBlock/spyblock.pdf.
-
C. Jackson, D. Boneh, and J. Mitchell. Attack of the transaction generators. http: //crypto.stanford.edu/SpyBlock/spyblock.pdf.
-
-
-
-
26
-
-
34548722186
-
Minimal TCB Code Execution
-
IEEE Computer Society
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, and A. Seshadri. Minimal TCB Code Execution. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 267-272. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 267-272
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
27
-
-
84869634558
-
-
January 2005
-
P. Meadowcroft. Combating card fraud. http://www.scmagazine.com/uk/news/ article/459478/combating+card+fraud/, January 2005.
-
Combating card fraud
-
-
Meadowcroft, P.1
-
28
-
-
35348989745
-
Trusted Computing
-
C.J. Mitchell, editor, The Institute of Electrical Engineers IEE, London, UK, April
-
C.J. Mitchell, editor. Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, April 2005.
-
(2005)
IEE Professional Applications of Computing Series
, vol.6
-
-
-
30
-
-
34547208096
-
TCG inside?: A Note on TPM Speciffication Compliance
-
ACM Press
-
A-R. Sadeghi, M. Selhorst, C. Stüble, C. Wachsmann, and M. Winandy. TCG inside?: A Note on TPM Speciffication Compliance. In Proceedings of the 1st ACM workshop on Scalable Trusted Computing, pages 47-56. ACM Press, 2006.
-
(2006)
Proceedings of the 1st ACM workshop on Scalable Trusted Computing
, pp. 47-56
-
-
Sadeghi, A.-R.1
Selhorst, M.2
Stüble, C.3
Wachsmann, C.4
Winandy, M.5
-
31
-
-
29244450159
-
Property-Based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms
-
ACM Press
-
A-R. Sadeghi and C. Stüble. Property-Based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms. In Proceedings of the 2004 Workshop on New Security Paradigms, pages 67-77. ACM Press, 2004.
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
33
-
-
84869608682
-
-
U.S. Securities and Exchange Commission
-
U.S. Securities and Exchange Commission. Form 10-K - The TJX Companies, INC. http://www.sec.gov/, 2007.
-
(2007)
Form 10-K - The TJX Companies, INC
-
-
-
34
-
-
70449824733
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
ACM Press
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles, pages 335-350. ACM Press, 2007.
-
(2007)
Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
35
-
-
70349230443
-
-
SETCo. SET Secure Electronic Transaction 1.0 Specification - The Formal Protocol Definition, May 1997.
-
SETCo. SET Secure Electronic Transaction 1.0 Specification - The Formal Protocol Definition, May 1997.
-
-
-
-
40
-
-
70349253598
-
-
TCG. TCG Mobile Trusted Module Speciffication, 1.0 revision 1 edition, 2007.
-
TCG. TCG Mobile Trusted Module Speciffication, 1.0 revision 1 edition, 2007.
-
-
-
-
42
-
-
84869617646
-
-
at Petrol Stations. online.co.uk/, Febuary 18 2007
-
The Sunday Times. Don't Use Cards at Petrol Stations. http://business.timesonline.co.uk/, Febuary 18 2007.
-
The Sunday Times. Don't Use Cards
-
-
|