Sciweavers

5484 search results - page 8 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CRITIS
2006
15 years 7 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
IEEEARES
2010
IEEE
15 years 10 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
EUROSEC
2008
ACM
15 years 5 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...
114
Voted
CSREASAM
2010
14 years 10 months ago
Security Challenges in Cloud Computing
Levent Ertaul, S. Singhal, Gökay Saldamli