Sciweavers

1229 search results - page 32 / 246
» Trusted Computing
Sort
View
111
Voted
ISPEC
2009
Springer
15 years 9 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
96
Voted
HOST
2008
IEEE
15 years 8 months ago
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
Johann Großschädl, Tobias Vejda, Dan Pa...
94
Voted
CCS
2007
ACM
15 years 8 months ago
Trusted computing challenges
Leendert van Doorn
77
Voted
ITRUST
2005
Springer
15 years 7 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...