-
1
-
-
70349244324
-
-
ARM
-
ARM. Trustzone-enabled processor. http://www.arm.com/pdfs/DDI0301D- arm1176jzfs-r0p2-trmpdf.
-
Trustzone-Enabled Processor
-
-
-
3
-
-
77952341351
-
Dynamic symmetric key provisioning protocol (dskpp)
-
November
-
A. Doherty et al. Dynamic symmetric key provisioning protocol (dskpp). IETF Internet Draft, version 06, November 2008. http://tools.ietf.org/html/ draft-ietf-keyprov-dskpp-06.
-
(2008)
IETF Internet Draft, Version 06
-
-
Doherty, A.1
-
6
-
-
45849091317
-
Onboard credentials platform: Design and implementation
-
Nokia Research Center, January
-
Jan-Erik Ekberg et al. Onboard credentials platform: Design and implementation. Technical Report NRC-TR-2008-001, Nokia Research Center, January 2008. http://research.nokia.com/files/NRCTR2008001pdf.
-
(2008)
Technical Report NRC-TR-2008-001
-
-
Ekberg, J.1
-
7
-
-
51849128784
-
Mobile trusted module
-
Nokia Research Center, November
-
Jan-Erik Ekberg and Markku Kylänpää. Mobile trusted module. Technical Report NRC-TR-2007-015, Nokia Research Center, November 2007. http://research.nokia.com/files/NRCTR2007015pdf.
-
(2007)
Technical Report NRC-TR-2007-015
-
-
Ekberg, J.1
Kylänpää, M.2
-
8
-
-
34548150723
-
Compartmented security for browsers - Or how to thwart a phisher with trusted computing
-
April
-
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stueble, and Marcel Winandy. Compartmented security for browsers - or how to thwart a phisher with trusted computing. In Proc. of IEEE International Conference on Availability, Reliability and Security (ARES'07), April 2007.
-
(2007)
Proc. of IEEE International Conference on Availability, Reliability and Security (ARES'07)
-
-
Gajek, S.1
Sadeghi, A.2
Stueble, C.3
Winandy, M.4
-
9
-
-
77952344732
-
-
August, GlobalPlatform white paper
-
GlobalPlatform. Why the mobile industry is evolving towards security, August 2007. GlobalPlatform white paper. http://www.globalplatform.org/uploads/ STIP-WhitePaperpdf.
-
(2007)
Why the Mobile Industry Is Evolving Towards Security
-
-
-
10
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Alex Halderman et al. Lest we remember: Cold boot attacks on encryption keys. In Proc. Usenix Security Symposium, 2008. http://citp. princeton.edu/memory/.
-
(2008)
Proc. Usenix Security Symposium
-
-
Halderman, A.1
-
15
-
-
77952381541
-
Cryptographic token key initialization protocol (CT-KIP)
-
November
-
Magnus Nyström. Cryptographic Token Key Initialization Protocol (CT-KIP). IETF RFC 4758, November 2006.
-
(2006)
IETF RFC
, pp. 4758
-
-
Nyström, M.1
-
18
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random function
-
May
-
Edward Suh, Charles O'Donnell, Ishan Sachdev, and Srinivas Devadas. Design and implementation of the AEGIS single-chip secure processor using physical random function. In Proc. 32nd Annual International Symposium on Computer Architecture (ISCA '05), pages 25-36, May 2005.
-
(2005)
Proc. 32nd Annual International Symposium on Computer Architecture (ISCA '05)
, pp. 25-36
-
-
Suh, E.1
O'Donnell, C.2
Sachdev, I.3
Devadas, S.4
-
19
-
-
77952383142
-
Tcg infrastructure workgroup
-
Specification Version 1.0 Revision, June
-
TCG Infrastructure Workgroup. Subject Key Attestation Evidence Extension", Specification Version 1.0 Revision 7, June 2005. https://www.trusted computinggroup.org/specs/IWG/.
-
(2005)
Subject Key Attestation Evidence Extension"
, pp. 7
-
-
|