-
1
-
-
14844295011
-
Direct anonymous attestation
-
Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: ACM Conference on Computer and Communications Security, pp. 132-145 (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
2
-
-
27244446779
-
-
Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., Stüble, C.: Secure data management in trusted computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 324-338. Springer, Heidelberg (2005)
-
Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., Stüble, C.: Secure data management in trusted computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 324-338. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
84968422314
-
How to build a trusted database system on untrusted storage
-
Berkeley, CA, USA, p, USENIX Association
-
Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: OSDI 2000 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation, Berkeley, CA, USA, p. 10. USENIX Association (2000)
-
(2000)
OSDI 2000 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation
, pp. 10
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, W.3
-
5
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a tpm without a trusted os
-
ACM, New York
-
Sarmenta, L.F.G., van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a tpm without a trusted os. In: STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing, pp. 27-42. ACM, New York (2006)
-
(2006)
STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
6
-
-
70350692113
-
TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 2 TPM Structures
-
Trusted Computing Group, Technical report, TCG July
-
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 2 TPM Structures. Technical report, TCG (July 2007)
-
(2007)
-
-
-
7
-
-
70350700703
-
TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 1 Design Principles
-
Trusted Computing Group, Technical report, TCG July
-
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 1 Design Principles. Technical report, TCG (July 2007)
-
(2007)
-
-
-
8
-
-
70350681846
-
TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 3 Command
-
Trusted Computing Group, Technical report, TCG July
-
Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 103, TPM Main Part 3 Command. Technical report, TCG (July 2007)
-
(2007)
-
-
-
9
-
-
55849122202
-
Trusted Platform Module (TPM) specifications
-
Trusted Computing Group, Technical report
-
Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report (2008), https://www.trustedcomputinggroup.org/specs/TPM
-
(2008)
-
-
-
10
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11-12), 2314-2341 (2007)
-
(2007)
Comput. Commun
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
|