-
5
-
-
0004192381
-
-
CRC Press, Boca Raton, Fl
-
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography, volume 6 of Discrete Mathematics and its Applications. CRC Press, Boca Raton, Fl, 1997.
-
(1997)
Handbook of Applied Cryptography, volume 6 of Discrete Mathematics and its Applications
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
7
-
-
1142270162
-
-
Prentice Hall, PTR, New York
-
B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, PTR, New York, 2003.
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
8
-
-
17544370316
-
Architectural support for copy and tamper resistant software
-
ACM Press, New York, November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pp. 169-177. ACM Press, New York, November 2000.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 169-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
9
-
-
1142280988
-
The AEGIS processor architecture for tamper-evident and tamper-resistant processing
-
ACM Press, San Francisco, June
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dyke, and S. Devadas. The AEGIS processor architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th Annual ACM International Conference on Supercomputing (ICS’03), pp. 160 - 171. ACM Press, San Francisco, June 2003.
-
(2003)
Proceedings of the 17th Annual ACM International Conference on Supercomputing (ICS’03)
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dyke, M.4
Devadas, S.5
-
15
-
-
70749096362
-
-
TCG specification version 1.2 Revision 62, The Trusted Computing Group, Portland, OR, USA, October
-
TCG. TPM Main, Part 1 design principles. TCG specification version 1.2 Revision 62, The Trusted Computing Group, Portland, OR, USA, October 2003.
-
(2003)
TPM Main, Part 1 design principles
-
-
-
16
-
-
85013601906
-
-
Portland, OR, USA, October
-
TCG. TPM Main, Part 2 TPM data structures. TCG specification version 1.2 Revision 62, The Trusted Computing Group, Portland, OR, USA, October 2003.
-
(2003)
TPM Main, Part 2 TPM data structures. TCG specification version 1.2 Revision 62, The Trusted Computing Group
-
-
-
17
-
-
85013621439
-
-
Portland, OR, USA, October
-
TCG. TPM Main, Part 3 Commands. TCG specification version 1.2 Revision 62, The Trusted Computing Group, Portland, OR, USA, October 2003.
-
(2003)
TPM Main, Part 3 Commands. TCG specification version 1.2 Revision 62, The Trusted Computing Group
-
-
-
18
-
-
0013347999
-
-
Technical Report RZ 3335 (#93381), IBM, IBM Research Division, Zurich Laboratory, April
-
B. Pfitzmann, J. Riordan, C. Stuble, M. Waidner, and A. Weber. The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM, IBM Research Division, Zurich Laboratory, April 2001.
-
(2001)
The PERSEUS system architecture
-
-
Pfitzmann, B.1
Riordan, J.2
Stuble, C.3
Waidner, M.4
Weber, A.5
-
19
-
-
35048881059
-
Taming ‘trusted platforms’ by operating system design
-
K. Chae and M. Yung, eds, Springer-Verlag, Berlin, Germany, August
-
A.-R. Sadeghi and C. Stuble. Taming ‘trusted platforms’ by operating system design. In K. Chae and M. Yung, eds, Proceedings of the 4th International Workshop. Information Security Applications, (WISA 2003), volume 2908 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany, August 2003.
-
(2003)
Proceedings of the 4th International Workshop. Information Security Applications, (WISA 2003), volume 2908 of Lecture Notes in Computer Science
-
-
Sadeghi, A.-R.1
Stuble, C.2
|