-
4
-
-
77952887452
-
Security Technology for Smart Grid Networks
-
Metke, A.R., Ekl, R.L.: Security Technology for Smart Grid Networks. IEEE Transactions on Smart Grid 1(1), 99-107 (2010)
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
5
-
-
33746640011
-
How to increase the security of digital rights management systems without affecting consumer's security
-
Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
-
Nützel, J., Beyer, A.: How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 368-380. Springer, Heidelberg (2006) (Pubitemid 44156261)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3995 LNCS
, pp. 368-380
-
-
Nutzel, J.1
Beyer, A.2
-
7
-
-
27244446779
-
Secure data management in trusted computing
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., Stüble, C.: Secure data management in trusted computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 324-338. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 324-338
-
-
Kühn, U.1
Kursawe, K.2
Lucks, S.3
Sadeghi, A.-R.4
Stüble, C.5
-
9
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
April
-
McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In: Eurosys 2008 Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, vol. 42, pp. 315-328 (April 2008)
-
(2008)
Eurosys 2008 Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems
, vol.42
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
10
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX Association
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13. USENIX Association (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
11
-
-
78650185193
-
Implementing an application-specific credential platform using late-launched mobile trusted module
-
ACM Press, New York
-
Bugiel, S., Ekberg, J.E.: Implementing an application-specific credential platform using late-launched mobile trusted module. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 21-30. ACM Press, New York (2010)
-
(2010)
Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010
, pp. 21-30
-
-
Bugiel, S.1
Ekberg, J.E.2
-
12
-
-
84886408459
-
On Using TPM for Secure Identities in Future Home Networks
-
January
-
Kinkelin, H., Holz, R., Niedermayer, H., Mittelberger, S., Carle, G.: On Using TPM for Secure Identities in Future Home Networks. In: Security in NGNs and the Future Internet, vol. 3, pp. 1-13 (January 2010)
-
(2010)
Security in NGNs and the Future Internet
, vol.3
, pp. 1-13
-
-
Kinkelin, H.1
Holz, R.2
Niedermayer, H.3
Mittelberger, S.4
Carle, G.5
-
13
-
-
82855181003
-
Interoperable device identification in Smart-Grid environments
-
IEEE July
-
Kuntze, N., Rudolph, C., Bente, I., Vieweg, J., von Helden, J.: Interoperable device identification in Smart-Grid environments. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1-7. IEEE (July 2011)
-
(2011)
2011 IEEE Power and Energy Society General Meeting
, pp. 1-7
-
-
Kuntze, N.1
Rudolph, C.2
Bente, I.3
Vieweg, J.4
Von Helden, J.5
-
14
-
-
74049088125
-
TruWallet: Trustworthy and migratable wallet-based web authentication
-
ACM
-
Gajek, S., Löhr, H., Sadeghi, A.R., Winandy, M.: TruWallet: trustworthy and migratable wallet-based web authentication. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009, pp. 19-28. ACM (2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009
, pp. 19-28
-
-
Gajek, S.1
Löhr, H.2
Sadeghi, A.R.3
Winandy, M.4
-
15
-
-
58349104116
-
Secure storage using a sealing proxy
-
ACM Press, New York
-
Cesena, E., Ramunno, G., Vernizzi, D.: Secure storage using a sealing proxy. In: Proceedings of the 1st European Workshop on System Security, EUROSEC 2008, pp. 27-34. ACM Press, New York (2008)
-
(2008)
Proceedings of the 1st European Workshop on System Security, EUROSEC 2008
, pp. 27-34
-
-
Cesena, E.1
Ramunno, G.2
Vernizzi, D.3
-
16
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
ACM Press, New York
-
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 21-24. ACM Press, New York (2006)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
17
-
-
79952612270
-
Beyond secure channels
-
ACM Press, New York
-
Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007, pp. 30-40. ACM Press, New York (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
|