Sciweavers

1229 search results - page 32 / 246
» Trusted Computing
Sort
View
ISPEC
2009
Springer
15 years 11 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
CCS
2007
ACM
15 years 11 months ago
Trusted computing challenges
Leendert van Doorn
101
Voted
ITRUST
2005
Springer
15 years 10 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...