Sciweavers

5476 search results - page 11 / 1096
» Resettably Secure Computation
Sort
View
82
Voted
CRITIS
2006
15 years 7 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
IEEEARES
2010
IEEE
15 years 10 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
119
Voted
EUROSEC
2008
ACM
15 years 5 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...