Sciweavers

5476 search results - page 11 / 1096
» Resettably Secure Computation
Sort
View
93
Voted
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Must You Know the Code of f to Securely Compute f?
Mike Rosulek
CRITIS
2006
15 years 5 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
IEEEARES
2010
IEEE
15 years 8 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
EUROSEC
2008
ACM
15 years 3 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...