-
1
-
-
67549101202
-
Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded Systems
-
N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded Systems. ACM Transactions Embedded Computing Systems, 8(1):1-31, 2008.
-
(2008)
ACM Transactions Embedded Computing Systems
, vol.8
, Issue.1
, pp. 1-31
-
-
Aaraj, N.1
Raghunathan, A.2
Jha, N.K.3
-
2
-
-
71549130796
-
Security and privacy protection for automated video surveillance
-
N. Baaziz, N. Lolo, O. Padilla, and F. Petngang. Security and privacy protection for automated video surveillance. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, pages 17-22, 2007.
-
(2007)
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology
, pp. 17-22
-
-
Baaziz, N.1
Lolo, N.2
Padilla, O.3
Petngang, F.4
-
3
-
-
7744236815
-
Real-Time Video Analysis on an Embedded Smart Camera for Traffic Surveillance
-
M. Bramberger, J. Brunner, B. Rinner, and H. Schwabach. Real-Time Video Analysis on an Embedded Smart Camera for Traffic Surveillance. In IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pages 174-181, 2004.
-
(2004)
IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)
, pp. 174-181
-
-
Bramberger, M.1
Brunner, J.2
Rinner, B.3
Schwabach, H.4
-
5
-
-
70350686777
-
Implementation Aspects of Mobile and Embedded Trusted Computing
-
Trusted Computing, Springer
-
K. Dietrich and J. Winter. Implementation Aspects of Mobile and Embedded Trusted Computing. In Trusted Computing, Lecture Notes in Computer Science, pages 29-44. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, pp. 29-44
-
-
Dietrich, K.1
Winter, J.2
-
9
-
-
55649119763
-
Smart Camera Based Monitoring System and Its Application to Assisted Living
-
S. Fleck and W. Strasser. Smart Camera Based Monitoring System and Its Application to Assisted Living. Proceedings of the IEEE, 96(10):1698-1714, 2008.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1698-1714
-
-
Fleck, S.1
Strasser, W.2
-
10
-
-
38149048562
-
Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules
-
Security and Privacy in Ad-hoc and Sensor Networks, Springer
-
U. Grossmann, E. Berkhan, L. C. Jatoba, J. Ottenbacher, W. Stork, and K. D. Mueller-Glaser. Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. In Security and Privacy in Ad-hoc and Sensor Networks, Lecture Notes in Computer Science, pages 172-186. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 172-186
-
-
Grossmann, U.1
Berkhan, E.2
Jatoba, L.C.3
Ottenbacher, J.4
Stork, W.5
Mueller-Glaser, K.D.6
-
11
-
-
61649123623
-
-
W. Hu, P. Corke, W. C. Shih, and L. Overs. secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In Conference On Embedded Networked Sensor Systems, Lecture Notes in Computer Science, pages 296-311. Springer, 2009.
-
W. Hu, P. Corke, W. C. Shih, and L. Overs. secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In Conference On Embedded Networked Sensor Systems, Lecture Notes in Computer Science, pages 296-311. Springer, 2009.
-
-
-
-
12
-
-
72249093328
-
-
IBM. TrouSerS TCG Software Stack. http://sourceforge.net/projects/ trousers/. last visited: Aug. 2009.
-
IBM. TrouSerS TCG Software Stack. http://sourceforge.net/projects/ trousers/. last visited: Aug. 2009.
-
-
-
-
13
-
-
57349170779
-
The Evolution from Single to Pervasive Smart Cameras
-
B. Rinner, T. Winkler, W. Schriebl, M. Quaritsch, and W. Wolf. The Evolution from Single to Pervasive Smart Cameras. In Proceedings of the Int. Conference on Distributed Smart Cameras (ICDSC), 2008.
-
(2008)
Proceedings of the Int. Conference on Distributed Smart Cameras (ICDSC)
-
-
Rinner, B.1
Winkler, T.2
Schriebl, W.3
Quaritsch, M.4
Wolf, W.5
-
15
-
-
85084162270
-
Design and Implementation of a TCG-Based Integrity Measurement Architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-Based Integrity Measurement Architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223-238, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
17
-
-
20844455524
-
Enabling Video Privacy through Computer Vision
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu. Enabling Video Privacy through Computer Vision. IEEE Security & Privacy Magazine, 3(3):50-57, 2005.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
18
-
-
55549106767
-
Security and Privacy in Distributed Smart Cameras
-
October
-
D. N. Serpanos and A. Papalambrou. Security and Privacy in Distributed Smart Cameras. Proceedings of the IEEE, 96(10):1678-1687, October 2008.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1678-1687
-
-
Serpanos, D.N.1
Papalambrou, A.2
-
19
-
-
33745948528
-
Java on the Bare Metal of Wireless Sensor Devices
-
D. Simon, C. Cifuentes, D. Cleal, J. Daniels, and D. White. Java on the Bare Metal of Wireless Sensor Devices. In Proceedings of the International Conference on Virtual Execution Environments, pages 78 - 88, 2006.
-
(2006)
Proceedings of the International Conference on Virtual Execution Environments
, pp. 78-88
-
-
Simon, D.1
Cifuentes, C.2
Cleal, D.3
Daniels, J.4
White, D.5
-
22
-
-
72249087509
-
-
Trusted Computing Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A. http://www.trustedcomputinggroup.org/ resources/tcg- software-stack-tss-specification, March 2007. last visited: Aug. 2009.
-
Trusted Computing Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A. http://www.trustedcomputinggroup.org/ resources/tcg- software-stack-tss-specification, March 2007. last visited: Aug. 2009.
-
-
-
-
23
-
-
72249087728
-
-
Trusted Computing Group. TPM Main Specification 1.2, Lelvel 2, Revision 103. http://www.trustedcomputinggroup.org/ resources/tpm-main-specification, July 2007. last visited: Aug. 2009.
-
Trusted Computing Group. TPM Main Specification 1.2, Lelvel 2, Revision 103. http://www.trustedcomputinggroup.org/ resources/tpm-main-specification, July 2007. last visited: Aug. 2009.
-
-
-
|