-
1
-
-
79951808410
-
-
Trusted Computing Group, "http://www.trustedcomputinggroup.org/. "
-
-
-
-
2
-
-
79951789164
-
-
IronKey, "https://www.ironkey.com/."
-
-
-
-
3
-
-
79951808409
-
-
Encryptakey, "http://www.encryptakey.com."
-
-
-
-
4
-
-
27244449284
-
-
microsoft Corporation
-
Mundie C., de Vries P., Haynes P., Corwine M., "Microsoft white paper on trustworthy computing," 2002, microsoft Corporation.
-
(2002)
Microsoft White Paper on Trustworthy Computing
-
-
Mundie, C.1
De Vries, P.2
Haynes, P.3
Corwine, M.4
-
5
-
-
77954092045
-
Concept for trusted personal devices in a mobile and networked environment
-
F. C. Bormann, L. Manteau, A. Linke, J. C. Pailles, and J. van Dijk, "Concept for trusted personal devices in a mobile and networked environment," in 15th IST mobile and wireless communication summit, 2006.
-
(2006)
15th IST Mobile and Wireless Communication Summit
-
-
Bormann, F.C.1
Manteau, L.2
Linke, A.3
Pailles, J.C.4
Van Dijk, J.5
-
7
-
-
21644445218
-
-
Trusted Computing Platform Alliance (TCPA)
-
Trusted Computing Platform Alliance (TCPA), "Main specification, version 1.1b," 2002.
-
(2002)
Main Specification, Version 1.1b
-
-
-
9
-
-
34948842456
-
Trust on a nationwide scale
-
DOI 10.1109/MSP.2007.127
-
V. Gratzer and D. Naccache, "Trust on a nationwide scale," IEEE Security and Privacy, vol. 5, no. 5, pp. 69-71, 2007. (Pubitemid 47525374)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.5
, pp. 69-71
-
-
Gratzer, V.1
-
10
-
-
79951796493
-
-
Gemalto, "http://www.gemalto.com."
-
-
-
-
11
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a tcg-based integrity measurement architecture," in Proceedings of the 13th conference on USENIX Security Symposium, 2004, pp. 16-16.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
12
-
-
77957107111
-
A snapshot of trusted personal devices applicable to transaction processing
-
D. Moreland, S. Nepal, H. Hwang, and J. Zic, "A snapshot of trusted personal devices applicable to transaction processing," Personal and Ubiquitous Computing, vol. 14, no. 4, pp. 347-361, 2010.
-
(2010)
Personal and Ubiquitous Computing
, vol.14
, Issue.4
, pp. 347-361
-
-
Moreland, D.1
Nepal, S.2
Hwang, H.3
Zic, J.4
-
14
-
-
38349053303
-
Trust extension device: Providing mobility and portability of trust in cooperative information systems
-
S. Nepal, J. Zic, H. Hwang, and D. Moreland, "Trust extension device: Providing mobility and portability of trust in cooperative information systems," in OTM Conferences (1), 2007, pp. 253-271.
-
(2007)
OTM Conferences (1)
, pp. 253-271
-
-
Nepal, S.1
Zic, J.2
Hwang, H.3
Moreland, D.4
-
17
-
-
84885889045
-
User authentication for online applications using a usb-based trust device
-
Jang J., Liu D., Nepal S., Zic J., "User authentication for online applications using a usb-based trust device," the Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), 2010.
-
(2010)
The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)
-
-
Jang, J.1
Liu, D.2
Nepal, S.3
Zic, J.4
|