-
1
-
-
41549096799
-
A practical approach for establishing trust relationships between remote platforms using trusted computing
-
Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. Springer, Heidelberg
-
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 156-168. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4912
, pp. 156-168
-
-
Dietrich, K.1
Pirker, M.2
Vejda, T.3
Toegl, R.4
Winkler, T.5
Lipp, P.6
-
2
-
-
70350686777
-
Implementation aspects of mobile and embedded trusted computing
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
-
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29-44. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5471
, pp. 29-44
-
-
Dietrich, K.1
Winter, J.2
-
4
-
-
77954716842
-
-
Trusted Computing Group: TCG Glossary, http://www.trustedcomputinggroup. org/developers/glossary
-
TCG Glossary
-
-
-
6
-
-
77954691659
-
The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy
-
Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Springer, Netherlands
-
Rouvroy, A., Poullet, Y.: The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In: Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection? pp. 45-76. Springer, Netherlands (2009)
-
(2009)
Reinventing Data Protection?
, pp. 45-76
-
-
Rouvroy, A.1
Poullet, Y.2
-
9
-
-
77954730046
-
-
Security Innovation: Core TCG Software Stack (CTSS), http://www. securityinnovation.com/pdf/collateral/trusted-software-stack.pdf
-
Core TCG Software Stack (CTSS)
-
-
-
10
-
-
77954699670
-
-
Microsoft Developer Network: TPM Base Services, http://msdn.microsoft. com/en-us/library/aa446796%28VS.85%29.aspx
-
TPM Base Services
-
-
-
11
-
-
38149004799
-
BIOS Security Analysis and a Kind of Trusted BIOS
-
Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Zhou, Z., Xu, R.: BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 427-437. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 427-437
-
-
Zhou, Z.1
Xu, R.2
-
12
-
-
77954707162
-
-
Phoenix Technologies: Phoenix SecureCore, http://www.phoenix.com/ptec/ docs/securecore-ds-en.pdf
-
Phoenix SecureCore
-
-
-
14
-
-
77954715320
-
-
Version 1.2 Level 2 Revision 103
-
Trusted Computing Group TPM Working Group: TPM Main Part 3 Commands Specification Version 1.2 Level 2 Revision 103, http://www. trustedcomputinggroup.org/files/static-page-files/ACD28F6C-1D09-3519- AD210DC2597F1E4C/mainP3Commandsrev103.pdf
-
TPM Main Part 3 Commands Specification
-
-
-
15
-
-
77954691875
-
Specification for the Advanced Encryption Standard (AES)
-
FIPS
-
FIPS: Specification for the Advanced Encryption Standard (AES), In: Federal Information Processing Standards Publication 197, http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf
-
Federal Information Processing Standards Publication 197
-
-
-
18
-
-
84893560866
-
-
Trusted Computing Group: TCG Specification Architecture Overview http://www.trustedcomputinggroup.org/files/resource-files/AC652DE1-1D09-3519- ADA026A0C05CFAC2/TCG-1-4-Architecture-Overview.pdf
-
TCG Specification Architecture Overview
-
-
|