Sciweavers

3299 search results - page 2 / 660
» Privacy and Trusted Computing
Sort
View
109
Voted
EUROSEC
2008
ACM
15 years 4 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...
101
Voted
TRUST
2009
Springer
15 years 9 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...
112
Voted
ISPEC
2009
Springer
15 years 9 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
ISI
2006
Springer
15 years 2 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
WISA
2010
Springer
15 years 11 days ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...