Sciweavers

1229 search results - page 32 / 246
» Trusted Computing
Sort
View
ISPEC
2009
Springer
15 years 4 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
CCS
2007
ACM
15 years 3 months ago
Trusted computing challenges
Leendert van Doorn
ITRUST
2005
Springer
15 years 3 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...