-
1
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
August [Online]. Available
-
J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn, "Turtles all the way down: Research challenges in user-based attestation," in Proceedings of the Workshop on Hot Topics in Security (HotSec), August 2007. [Online]. Available: http://www.truststc.org/pubs/286.html
-
(2007)
Proceedings of the Workshop on Hot Topics in Security (HotSec)
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Van Doorn, L.4
-
2
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
New York, NY, USA: ACM
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Trustworthy and personalized computing on public kiosks," in MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2008, pp. 199-210.
-
(2008)
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 199-210
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
3
-
-
70350633575
-
Tagging the turtle: Local attestation for kiosk computing
-
J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T. hoon Kim, and S.-S. Yeo, Eds. Springer Berlin / Heidelberg
-
R. Toegl, "Tagging the turtle: Local attestation for kiosk computing," in Advances in Information Security and Assurance, ser. Lecture Notes in Computer Science, J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T. hoon Kim, and S.-S. Yeo, Eds., vol. 5576. Springer Berlin / Heidelberg, 2009, pp. 60-69.
-
(2009)
Advances in Information Security and Assurance, Ser. Lecture Notes in Computer Science
, vol.5576
, pp. 60-69
-
-
Toegl, R.1
-
4
-
-
85028124659
-
An approach to introducing locality in remote attestation using near field communications
-
in print. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0407- 1
-
R. Toegl and M. Hutter, "An approach to introducing locality in remote attestation using near field communications," The Journal of Supercomputing, pp. -, 2010, in print. [Online]. Available: http://dx.doi.org/ 10.1007/s11227-010-0407-1
-
(2010)
The Journal of Supercomputing
-
-
Toegl, R.1
Hutter, M.2
-
5
-
-
85052678926
-
Bootstrapping trust in a "trusted" platform
-
San Jose, CA: USENIX Association
-
B. Parno, "Bootstrapping trust in a "trusted" platform," in Proceedings of the 3rd conference on Hot topics in security. San Jose, CA: USENIX Association, 2008, pp. 1-6.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 1-6
-
-
Parno, B.1
-
8
-
-
79952094695
-
Dynamics of a trusted platform: A building block approach
-
D. J. Clark, Ed. Intel Press February no. ISBN 978-1934053171
-
D. Grawrock, Dynamics of a Trusted Platform: A Building Block Approach, D. J. Clark, Ed. Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961: Richard Bowles, February 2009, no. ISBN 978-1934053171.
-
(2009)
Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, or 97124-5961: Richard Bowles
-
-
Grawrock, D.1
-
9
-
-
77954703978
-
-
Intel Corporation December [Online]. Available
-
Intel Corporation, "Intel Trusted Execution Technology Software Development Guide," December 2009. [Online]. Available: http://download.intel.com/technology/security/downloads/315168.pdf
-
(2009)
Intel Trusted Execution Technology Software Development Guide
-
-
-
10
-
-
70350639602
-
A PrivacyCA for anonymity and trust
-
L. Chen, C. J. Mitchell, and M. Andrew, Eds. Springer Berlin / Heidelberg
-
M. Pirker, R. Toegl, D. Hein, and P. Danner, "A PrivacyCA for anonymity and trust," in Trust '09: Proceedings of the 2nd International Conference on Trusted Computing, ser. LNCS, L. Chen, C. J. Mitchell, and M. Andrew, Eds., vol. 5471. Springer Berlin / Heidelberg, 2009.
-
(2009)
Trust '09: Proceedings of the 2nd International Conference on Trusted Computing, Ser. LNCS
, vol.5471
-
-
Pirker, M.1
Toegl, R.2
Hein, D.3
Danner, P.4
-
11
-
-
33749013010
-
Privacy for RFID through trusted computing
-
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
-
D. Molnar, A. Soppera, and D. Wagner, "Privacy for RFID Through Trusted Computing," in ACM Workshop On Privacy In The Electronic Society, WPES, Alexandria, Virginia, USA, November, 2005, Proceedings. ACM Press, November 2005, pp. 31-34. [Online]. Available: http://www.cs.berkeley.edu/ ~dmolnar/papers/wpes05-camera.pdf (Pubitemid 44447414)
-
(2005)
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 31-34
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
12
-
-
58049157890
-
Secure mobile payment via trusted computing
-
October 14 - 17 Wuhan, China, Proceedings. Hubei: IEEE, November 2008 [Online]. Available
-
Q. Li, X. Zhang, J.-P. Seifert, and H. Zhong, "Secure Mobile Payment via Trusted Computing," in Asia-Pacific Trusted Infrastructure Technologies - APTC, Third International Conference, October 14 - 17, 2008, Wuhan, China, Proceedings. Hubei: IEEE, November 2008, pp. 98-112. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=4683087&tag= 1
-
(2008)
Asia-pacific Trusted Infrastructure Technologies - APTC, Third International Conference
, pp. 98-112
-
-
Li, Q.1
Zhang, X.2
Seifert, J.-P.3
Zhong, H.4
-
13
-
-
77952359310
-
Towards a virtual trusted platform
-
M. Pirker and R. Toegl, "Towards a virtual trusted platform," Journal of Universal Computer Science, vol. 16, no. 4, pp. 531-542, 2010, http://www.jucs.org/jucs-16-4/towards-a-virtual-trusted.
-
(2010)
Journal of Universal Computer Science
, vol.16
, Issue.4
, pp. 531-542
-
-
Pirker, M.1
Toegl, R.2
-
14
-
-
77954737988
-
Dynamic enforcement of platform integrity (a short paper)
-
Springer Verlag (in print)
-
M. Pirker and R. Toegl, "Dynamic enforcement of platform integrity (a short paper)," in Proc. 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), ser. LNCS, vol. 6101. Springer Verlag, 2010, (in print).
-
(2010)
Proc. 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), Ser. LNCS
, vol.6101
-
-
Pirker, M.1
Toegl, R.2
-
15
-
-
79952099148
-
-
Intel Corporation [Online]. Available
-
Intel Corporation, "Trusted Boot," 2008. [Online]. Available: http://sourceforge.net/projects/tboot/
-
(2008)
Trusted Boot
-
-
-
17
-
-
54049158076
-
Kvm: The linux virtual machine monitor
-
A. Kivity, V. Kamay, D. Laor, U. Lublin, and A. Liguori, "kvm: the Linux Virtual Machine Monitor," in OLS2007: Proceedings of the Linux Symposium, 2007, pp. 225-230.
-
(2007)
OLS2007: Proceedings of the Linux Symposium
, pp. 225-230
-
-
Kivity, A.1
Kamay, V.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
20
-
-
4143091512
-
-
January available online at [Online]. Available: http://www.itl.nist.gov/ fipspubs/
-
National Institute of Standards and Technology (NIST), "FIPS-186-2: Digital Signature Standard (DSS)," January 2000, available online at http://www.itl.nist.gov/fipspubs/. [Online]. Available: http://www.itl.nist.gov/ fipspubs/
-
(2000)
FIPS-186-2: Digital Signature Standard (DSS)
-
-
-
21
-
-
84974665915
-
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
-
Progress in Cryptology - INDOCRYPT 2002
-
T. Izu, B. Möller, and T. Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks," in INDOCRYPT, ser. Lecture Notes in Computer Science, A. Menezes and P. Sarkar, Eds., vol. 2551. Springer, 2002, pp. 296-313. (Pubitemid 36107934)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2551
, pp. 296-313
-
-
Izu, T.1
Moller, B.2
Takagi, T.3
|