|
Conferences in DBLP
Trusted computing challenges. [Citation Graph (, )][DBLP]
An integrated architecture for trusted computing for java enabled embedded devices. [Citation Graph (, )][DBLP]
A trusted mobile phone reference architecturevia secure kernel. [Citation Graph (, )][DBLP]
Reconfigurable trusted computing in hardware. [Citation Graph (, )][DBLP]
Linux kernel integrity measurement using contextual inspection. [Citation Graph (, )][DBLP]
Beyond secure channels. [Citation Graph (, )][DBLP]
Offline untrusted storage with immediate detection of forking and replay attacks. [Citation Graph (, )][DBLP]
The insider threat in scalable distributed systems: algorithms, metrics and gaps. [Citation Graph (, )][DBLP]
Realizing property-based attestation and sealing with commonly available hard- and software. [Citation Graph (, )][DBLP]
Trust management for trusted computing platforms in web services. [Citation Graph (, )][DBLP]
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. [Citation Graph (, )][DBLP]
Flexible intrusion tolerant voting architecture. [Citation Graph (, )][DBLP]
|