Sciweavers

10 search results - page 1 / 2
» Security Evaluation of Scenarios Based on the TCG's TPM Spec...
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Security Evaluation of Scenarios Based on the TCG's TPM Specification
Sigrid Gürgens, Carsten Rudolph, Dirk Scheuer...
CCS
2007
ACM
13 years 9 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
EUROPKI
2009
Springer
13 years 2 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 5 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
ACSAC
2004
IEEE
13 years 8 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee