-
4
-
-
70749093631
-
Property-based attestation without a trusted third party
-
L. Chen, H. Lohr, M. Manulis, and A. Sadeghi. Property-based attestation without a trusted third party. Information Security, pages 1-16, 2008.
-
(2008)
Information Security
, pp. 1-16
-
-
Chen, L.1
Lohr, H.2
Manulis, M.3
Sadeghi, A.4
-
5
-
-
84903846058
-
A minimalist approach to remote attestation
-
A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. A minimalist approach to Remote Attestation. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014, pages 1-6, 2014.
-
(2014)
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014
, pp. 1-6
-
-
Francillon, A.1
Nguyen, Q.2
Rasmussen, K.B.3
Tsudik, G.4
-
6
-
-
84960359869
-
Google
-
URL
-
Google. Android Home Page. URL: http://www.android.com/.
-
Android Home Page
-
-
-
9
-
-
84861881940
-
Cumulative attestation kernels for embedded systems
-
June
-
M. LeMay and C. a. Gunter. Cumulative Attestation Kernels for Embedded Systems. IEEE Transactions on Smart Grid, 3(2):744-760, June 2012.
-
(2012)
IEEE Transactions on Smart Grid
, vol.3
, Issue.2
, pp. 744-760
-
-
LeMay, M.1
Gunter, C.A.2
-
11
-
-
2442425355
-
Integrating exible support for security policies into the linux operating system
-
number February
-
N. P. Loscocco. Integrating exible support for security policies into the Linux operating system. In FREENIX Track: 2001 USENIX Annual Technical, number February, 2001.
-
(2001)
FREENIX Track: 2001 USENIX Annual Technical
-
-
Loscocco, N.P.1
-
12
-
-
77954740912
-
Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform
-
M. Nauman, S. Khan, X. Zhang, and J. Seifert. Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform. Trust and Trustworthy Computing, pages 1-15, 2010.
-
(2010)
Trust and Trustworthy Computing
, pp. 1-15
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
Seifert, J.4
-
14
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkeley, CA, USA, USENIX Association
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
15
-
-
33646075344
-
Outbound authentication for programmable secure coprocessors
-
May
-
S. W. Smith. Outbound authentication for programmable secure coprocessors. International Journal of Information Security, 3(1):28-41, May 2004.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 28-41
-
-
Smith, S.W.1
-
16
-
-
80053610542
-
-
Trusted Computing Group. Version 1.2
-
Trusted Computing Group. TPM Main Specificication Level 2 Version 1.2, 2006.
-
(2006)
TPM Main Specificication Level 2
-
-
-
17
-
-
84863378022
-
Remote attestation with domain-based integrity model and policy analysis
-
W. Xu, X. Zhang, and H. Hu. Remote attestation with domain-based integrity model and policy analysis. Dependable and Secure Computing, 9(3):429-442, 2012.
-
(2012)
Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 429-442
-
-
Xu, W.1
Zhang, X.2
Hu, H.3
|