Sciweavers

3299 search results - page 2 / 660
» Privacy and Trusted Computing
Sort
View
117
Voted
EUROSEC
2008
ACM
15 years 5 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...
108
Voted
TRUST
2009
Springer
15 years 10 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...
ISPEC
2009
Springer
15 years 10 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
ISI
2006
Springer
15 years 3 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
WISA
2010
Springer
15 years 1 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...