-
2
-
-
33344460692
-
Distributed embedded smart cameras for surveillance applications
-
Bramberger M., Doblander A., Maier A., Rinner B., Schwabach H., Distributed embedded smart cameras for surveillance applications Computer 2006 39 2 68 75
-
(2006)
Computer
, vol.39
, Issue.2
, pp. 68-75
-
-
Bramberger, M.1
Doblander, A.2
Maier, A.3
Rinner, B.4
Schwabach, H.5
-
5
-
-
57349170779
-
The evolution from single to pervasive smart cameras
-
Rinner B., Winkler T., Schriebl W., Quaritsch M., Wolf W., The evolution from single to pervasive smart cameras Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras 2008 10
-
(2008)
Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras
, pp. 10
-
-
Rinner, B.1
Winkler, T.2
Schriebl, W.3
Quaritsch, M.4
Wolf, W.5
-
7
-
-
51349121612
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
Schiff J., Meingast M., Mulligan D. K., Sastry S., Goldberg K., Respectful cameras: detecting visual markers in real-time to address privacy concerns Proceedings of the IEEE International Conference on Intelligent Robots and Systems 2007 971 978
-
(2007)
Proceedings of the IEEE International Conference on Intelligent Robots and Systems
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.K.3
Sastry, S.4
Goldberg, K.5
-
13
-
-
77649293917
-
The ten page introduction to trusted computing
-
RR-08-11 Oxford University Computing Laboratory
-
Martin A., The ten page introduction to trusted computing type December 2008 RR-08-11 Oxford University Computing Laboratory
-
(2008)
Type
-
-
Martin, A.1
-
15
-
-
78249264846
-
-
May
-
Trusted Computing Group, TCG Website. May 2010, https://www. trustedcomputinggroup.org/
-
(2010)
TCG Website
-
-
-
16
-
-
77953780587
-
-
Trusted Computing Group, Level 1, Errata A. Trusted Computing Group, March
-
Trusted Computing Group, TCG software stack specification (TSS) version 1.2. Level 1, Errata A. Trusted Computing Group, March 2007
-
(2007)
TCG Software Stack Specification (TSS) Version 1.2
-
-
-
17
-
-
77957806075
-
-
Trusted Computing Group, Level 2, Revision 103. Trusted Computing Group, July
-
Trusted Computing Group, TPM main specification version 1.2. Level 2, Revision 103. Trusted Computing Group, July 2007
-
(2007)
TPM Main Specification Version 1.2
-
-
-
24
-
-
70349253246
-
Trusted computing building blocks for embedded Linux-based ARM trust zone platforms
-
ACM
-
Winter J., Trusted computing building blocks for embedded Linux-based ARM trust zone platforms Proceedings of the Workshop on Scalable Trusted Computing 2008 ACM 21 30
-
(2008)
Proceedings of the Workshop on Scalable Trusted Computing
, pp. 21-30
-
-
Winter, J.1
-
27
-
-
55549106767
-
Security and privacy in distributed smart cameras
-
Serpanos D. N., Papalambrou A., Security and privacy in distributed smart cameras Proceedings of the IEEE 2008 96 10 1678 1687
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1678-1687
-
-
Serpanos, D.N.1
Papalambrou, A.2
-
28
-
-
20844455524
-
Enabling video privacy through computer vision
-
Senior A., Pankanti S., Hampapur A., Brown L., Tian Y.-L., Ekin A., Connell J., Shu C. F., Lu M., Enabling video privacy through computer vision IEEE Security and Privacy 2005 3 3 50 57
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
29
-
-
0027697301
-
Trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman G. L., Trustworthy digital camera: restoring credibility to the photographic image IEEE Transactions on Consumer Electronics 1993 39 4 905 910
-
(1993)
IEEE Transactions on Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
32
-
-
34249030190
-
Practical solution to authentication of images with a secure camera
-
Quisquater J.-J., Macq B., Joye M., Degand N., Bernard A., Practical solution to authentication of images with a secure camera Journal on Storage and Retrieval for Image and Video Databases 1997 3022 1 290 297
-
(1997)
Journal on Storage and Retrieval for Image and Video Databases
, vol.3022
, Issue.1
, pp. 290-297
-
-
Quisquater, J.-J.1
Macq, B.2
Joye, M.3
Degand, N.4
Bernard, A.5
-
34
-
-
70350619334
-
A secure digital camera architecture for integrated real-time digital rights management
-
Mohanty S. P., A secure digital camera architecture for integrated real-time digital rights management Journal of Systems Architecture 2009 55 1012 468 480
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.1012
, pp. 468-480
-
-
Mohanty, S.P.1
-
35
-
-
38149048562
-
Security for mobile low power nodes in a personal area network by means of trusted platform modules
-
Springer Lecture Notes in Computer Science
-
Grossmann U., Berkhan E., Jatoba L. C., Ottenbacher J., Stork W., Mueller-Glaser K.D., Security for mobile low power nodes in a personal area network by means of trusted platform modules 4572 Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks 2007 Springer 172 186 Lecture Notes in Computer Science
-
(2007)
Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks
, vol.4572
, pp. 172-186
-
-
Grossmann, U.1
Berkhan, E.2
Jatoba, L.C.3
Ottenbacher, J.4
Stork, W.5
Mueller-Glaser, K.D.6
-
36
-
-
61649123623
-
SecFleck: A public key technology platform for wireless sensor networks
-
Lecture Notes in Computer Science
-
Hu W., Corke P., Shih W. C., Overs L., SecFleck: a public key technology platform for wireless sensor networks 5432 Proceedings of the Conference on Embedded Networked Sensor Systems 2009 296 311 Lecture Notes in Computer Science
-
(2009)
Proceedings of the Conference on Embedded Networked Sensor Systems
, vol.5432
, pp. 296-311
-
-
Hu, W.1
Corke, P.2
Shih, W.C.3
Overs, L.4
-
40
-
-
70350686777
-
Implementation aspects of mobile and embedded trusted computing
-
Springer Lecture Notes in Computer Science
-
Dietrich K., Winter J., Implementation aspects of mobile and embedded trusted computing Trusted Computing 2009 Springer 29 44 Lecture Notes in Computer Science
-
(2009)
Trusted Computing
, pp. 29-44
-
-
Dietrich, K.1
Winter, J.2
-
41
-
-
49749102763
-
A system architecture for reconfigurable trusted platforms
-
March
-
Glas B., Klimm A., Sander O., Mller-Glaser K., Becker J., A system architecture for reconfigurable trusted platforms Proceedings of the Conference of Design, Automation and Test in Europe (DATE '08) March 2008 541 544
-
(2008)
Proceedings of the Conference of Design, Automation and Test in Europe (DATE '08)
, pp. 541-544
-
-
Glas, B.1
Klimm, A.2
Sander, O.3
Mller-Glaser, K.4
Becker, J.5
-
42
-
-
51549101299
-
A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates
-
Glas B., Klimm A., Schwab D., Mller-Glaser K., Becker J., A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates Proceedings of the 19th IEEE/IFIP International Symposium on Rapid System Prototyping (RSP '08) 2008 135 141
-
(2008)
Proceedings of the 19th IEEE/IFIP International Symposium on Rapid System Prototyping (RSP '08)
, pp. 135-141
-
-
Glas, B.1
Klimm, A.2
Schwab, D.3
Mller-Glaser, K.4
Becker, J.5
-
43
-
-
79959557051
-
Reconfigurable trusted computing in hardware
-
Eisenbarth T., Gneysu T., Paar C., Sadeghi A.-R., Schellekens D., Wolf M., Reconfigurable trusted computing in hardware Proceedings of the Workshop on Scalable Trusted Computing 2007 15 20
-
(2007)
Proceedings of the Workshop on Scalable Trusted Computing
, pp. 15-20
-
-
Eisenbarth, T.1
Gneysu, T.2
Paar, C.3
Sadeghi, A.-R.4
Schellekens, D.5
Wolf, M.6
|