-
1
-
-
70349231388
-
Deliverable 2.3: The high-level protocol specication language
-
AVISPA, Technical report
-
AVISPA. Deliverable 2.3: The high-level protocol specication language. Technical report, http://www.avispa-project.org/delivs/2.1/d2-1.pdf, 2003.
-
(2003)
-
-
-
2
-
-
84910156435
-
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
-
-
-
-
3
-
-
34547196300
-
A protocol for property-based attestation
-
New York, NY, USA, ACM Press
-
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, C. Stüble, and H. Görtz. A protocol for property-based attestation. In STC '06: Proceedings of the rst ACM workshop on Scalable trusted computing, pages 7-16, New York, NY, USA, 2006. ACM Press.
-
(2006)
STC '06: Proceedings of the rst ACM workshop on Scalable trusted computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
Görtz, H.7
-
4
-
-
23144433992
-
A high level protocol specication language for industrial security-sensitive protocols
-
Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drieslma, J. Mantovani, S. Mödersheim, and L. Vigneron. A high level protocol specication language for industrial security-sensitive protocols. In Proceedings of Workshop on Specication and Automated Processing of Security Requirements (SAPS 2004), 2004.
-
(2004)
Proceedings of Workshop on Specication and Automated Processing of Security Requirements (SAPS 2004)
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Drieslma, P.H.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
5
-
-
70349248289
-
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. Technical report, IETF Network Working Group, 2006
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. Technical report, IETF Network Working Group, 2006.
-
-
-
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
New York, NY, USA, ACM Press
-
T. Garnkel, B. Pfa, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating Systems Principles, pages 193-206, New York, NY, USA, 2003. ACM Press.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating Systems Principles
, pp. 193-206
-
-
Garnkel, T.1
Pfa, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
79952612270
-
Beyond secure channels
-
New York, NY, USA, ACM
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond secure channels. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 30-40, New York, NY, USA, 2007. ACM.
-
(2007)
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
9
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
Fairfax, Virginia, November
-
K. Goldman, R. Perez, and R. Sailer. Linking remote attestation to secure tunnel endpoints. In First ACM Workshop on Scalable Trusted Computing, Fairfax, Virginia, November 2006.
-
(2006)
First ACM Workshop on Scalable Trusted Computing
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
11
-
-
38149142765
-
-
C. Krauß, F. Stumpf, and C. Eckert. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Lecture Notes in Computer Science, Cambridge, UK, July 2007. Springer-Verlag.
-
C. Krauß, F. Stumpf, and C. Eckert. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Lecture Notes in Computer Science, Cambridge, UK, July 2007. Springer-Verlag.
-
-
-
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
New York, NY, USA, ACM Press
-
L. Lamport. Password authentication with insecure communication. In Commun. ACM, volume 24, pages 770-772, New York, NY, USA, 1981. ACM Press.
-
(1981)
Commun. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
84883516955
-
On Micro-Kernel Construction
-
New York, NY, USA, ACM Press
-
J. Liedtke. On Micro-Kernel Construction. In SOSP '95: Proceedings of the fteenth ACM Symposium on Operating Systems Principles, pages 237-250, New York, NY, USA, 1995. ACM Press.
-
(1995)
SOSP '95: Proceedings of the fteenth ACM Symposium on Operating Systems Principles
, pp. 237-250
-
-
Liedtke, J.1
-
14
-
-
70349246900
-
Enhancing grid security using trusted virtualization
-
Tokyo, Japan, November
-
H. Löhr, H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and C. Stüble. Enhancing grid security using trusted virtualization. In Second Workshop on Advances in Trusted Computing (WATC'06), Tokyo, Japan, November 2006.
-
(2006)
Second Workshop on Advances in Trusted Computing (WATC'06)
-
-
Löhr, H.1
Ramasamy, H.V.2
Sadeghi, A.-R.3
Schulz, S.4
Schunter, M.5
Stüble, C.6
-
15
-
-
55849084187
-
Play it once again, sam - enforcing stateful licenses on open platforms
-
Tokyo, Japan, November
-
A.-R. Sadeghi, M. Scheibel, C. Stüble, and M. Wolf. Play it once again, sam - enforcing stateful licenses on open platforms. In 2nd Workshop on Advances in Trusted Computing (WATC '06 Fall), Tokyo, Japan, November 2006.
-
(2006)
2nd Workshop on Advances in Trusted Computing (WATC '06 Fall)
-
-
Sadeghi, A.-R.1
Scheibel, M.2
Stüble, C.3
Wolf, M.4
-
17
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
New York, NY, USA, ACM Press
-
A.-R. Sadeghi and C. Stuble. Property-based attestation for computing platforms: caring about properties, not mechanisms. In NSPW '04: Proceedings of the 2004 workshop on New security paradigms, pages 67-77, New York, NY, USA, 2004. ACM Press.
-
(2004)
NSPW '04: Proceedings of the 2004 workshop on New security paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stuble, C.2
-
18
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
New York, NY, USA, ACM Press
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn. Attestation-based policy enforcement for remote access. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 308-317, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doorn, L.4
-
19
-
-
27544477855
-
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
-
Washington, DC, USA, IEEE Computer Society
-
E. Shi, A. Perrig, and L. V. Doorn. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 154-168, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Doorn, L.V.3
-
20
-
-
37149035513
-
An Approach to a Trustworthy System Architecture using Virtualization
-
Proceedings of the 4th International Conference on Autonomic and Trusted Computing ATC-2007, of, Hong Kong, China, Springer-Verlag
-
F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert. An Approach to a Trustworthy System Architecture using Virtualization. In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC-2007), volume 4158 of Lecture Notes in Computer Science, Hong Kong, China, 2007. Springer-Verlag.
-
(2007)
Lecture Notes in Computer Science
, vol.4158
-
-
Stumpf, F.1
Benz, M.2
Hermanowski, M.3
Eckert, C.4
-
21
-
-
55849096263
-
-
F. Stumpf and C. Eckert. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 25-31, 2008. IEEE Computer Society.
-
F. Stumpf and C. Eckert. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 25-31, 2008. IEEE Computer Society.
-
-
-
-
22
-
-
49049096411
-
A Robust Integrity Reporting Protocol for Remote Attestation
-
Tokyo, Japan, November
-
F. Stumpf, O. Tafreschi, P. Roder, and C. Eckert. A Robust Integrity Reporting Protocol for Remote Attestation. In Second Workshop on Advances in Trusted Computing (WATC'06 Fall), Tokyo, Japan, November 2006.
-
(2006)
Second Workshop on Advances in Trusted Computing (WATC'06 Fall)
-
-
Stumpf, F.1
Tafreschi, O.2
Roder, P.3
Eckert, C.4
-
23
-
-
70349235886
-
-
Trusted Computing Group. TCG TPM Specication Version 1.2 Revision 103, Structure of the TPM. Technical report, TCG, 2007
-
Trusted Computing Group. TCG TPM Specication Version 1.2 Revision 103, Structure of the TPM. Technical report, TCG, 2007.
-
-
-
-
24
-
-
70349254489
-
-
Trusted Computing Group. Infrastructure Subject Key Attestation Evidence Extension Version 1.0, Revision 5. Technical report, TCG, 2005
-
Trusted Computing Group. Infrastructure Subject Key Attestation Evidence Extension Version 1.0, Revision 5. Technical report, TCG, 2005.
-
-
-
-
25
-
-
77949578993
-
TCG TPM Specication, Architecture Overview
-
Trusted Computing Group, Technical report, TCG, 2007
-
Trusted Computing Group. TCG TPM Specication, Architecture Overview. Technical report, TCG, 2007.
-
-
-
-
26
-
-
54749125032
-
Trusted Platform Module (TPM) specications
-
Trusted Computing Group, Technical report, TCG, 2008
-
Trusted Computing Group. Trusted Platform Module (TPM) specications. Technical report, TCG, 2008, https://www.trustedcomputinggroup.org/specs/TPM
-
-
-
-
27
-
-
70349249893
-
-
L. Viganò. Automated Security Protocol Analysis with the AVISPA Tool. In Proceedings of the XXI Mathematical Foundations of Programming Semantics (MFPS'05), 155 of ENTCS, Elsevier, 2005.
-
L. Viganò. Automated Security Protocol Analysis with the AVISPA Tool. In Proceedings of the XXI Mathematical Foundations of Programming Semantics (MFPS'05), volume 155 of ENTCS, Elsevier, 2005.
-
-
-
|