Sciweavers

1229 search results - page 32 / 246
» Trusted Computing
Sort
View
ISPEC
2009
Springer
14 years 2 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
CCS
2007
ACM
14 years 1 months ago
Trusted computing challenges
Leendert van Doorn
ITRUST
2005
Springer
14 years 1 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...