-
1
-
-
77954691669
-
-
ARM. Trustzone technology overview (2009), http://www.arm.com/products/ security/trustzone/index.html
-
(2009)
Trustzone Technology Overview
-
-
-
2
-
-
70350637699
-
Measuring semantic integrity for remote attestation
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
-
Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 81-100. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5471
, pp. 81-100
-
-
Baiardi, F.1
Cilea, D.2
Sgandurra, D.3
Ceccarelli, F.4
-
3
-
-
52949106502
-
The trusted execution module: Commodity general-purpose trusted computing
-
Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
-
Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The trusted execution module: Commodity general-purpose trusted computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 133-148. Springer, Heidelberg (2008), http://people.csail.mit.edu/devadas/pubs/cardis08tem.pdf
-
(2008)
LNCS
, vol.5189
, pp. 133-148
-
-
Costan, V.1
Sarmenta, L.F.G.2
Van Dijk, M.3
Devadas, S.4
-
4
-
-
70449690094
-
-
Internet Crime Complaint Center. Internet crime report (2008), http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf
-
(2008)
Internet Crime Report
-
-
-
5
-
-
84958776015
-
Personal secure booting
-
Varadharajan, V., Mu, Y. (eds.) ACISP 2001. Springer, Heidelberg
-
Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 130-144. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2119
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.J.3
Reeves, D.M.4
-
7
-
-
74049088382
-
On-board credentials with open provisioning
-
Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proc. of ACM Symposium on Information, Computer & Communications Security, ASIACCS 2009 (2009)
-
(2009)
Proc. of ACM Symposium on Information, Computer & Communications Security, ASIACCS 2009
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
-
9
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
USENIX
-
Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 179-194. USENIX (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium, August 2004
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
10
-
-
77954743351
-
-
Nokia. Symbian OS platform security, http://www.forum.nokia.com/ Technology-Topics/Device-Platforms/S60/Platform-Security/
-
Symbian OS Platform Security
-
-
-
12
-
-
77954728369
-
-
November
-
SANS Institute. SANS Top-20 2007 Security Risks (November 2008), http://www.sans.org/top20/2007/top20.pdf
-
(2008)
SANS Top-20 2007 Security Risks
-
-
-
13
-
-
33646075344
-
Outbound authentication for programmable secure coprocessors
-
Smith, S.W.: Outbound authentication for programmable secure coprocessors. International Journal of Information Security 3, 28-41 (2004)
-
(2004)
International Journal of Information Security
, vol.3
, pp. 28-41
-
-
Smith, S.W.1
-
14
-
-
77954722817
-
M-Shield mobile security technology
-
Srage, J., Azema, J.: M-Shield mobile security technology, TI White paper (2005), http://focus.ti.com/pdfs/wtbu/ti-mshield-whitepaper.pdf
-
(2005)
TI White Paper
-
-
Srage, J.1
Azema, J.2
-
15
-
-
77954739187
-
-
Trusted Computing Group, https://www.trustedcomputinggroup.org/home
-
-
-
|