


default search action
TRUST 2009: Oxford, UK
- Liqun Chen, Chris J. Mitchell
, Andrew P. Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2
Implementation of Trusted Computing
- Paul England, Talha Tariq:
Towards a Programmable TPM. 1-13 - Loïc Duflot, Olivier Levillain, Benjamin Morin:
ACPI: Design Principles and Concerns. 14-28 - Kurt Dietrich, Johannes Winter:
Implementation Aspects of Mobile and Embedded Trusted Computing. 29-44 - Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy:
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. 45-62
Attestation
- Mohammad Nauman
, Masoom Alam, Xinwen Zhang, Tamleek Ali:
Remote Attestation of Attribute Updates and Information Flows in a UCON System. 63-80 - Fabrizio Baiardi
, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli:
Measuring Semantic Integrity for Remote Attestation. 81-100
PKI for Trusted Computing
- Martin Pirker
, Ronald Toegl, Daniel M. Hein, Peter Danner:
A PrivacyCA for Anonymity and Trust. 101-119 - Stefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf:
Revocation of TPM Keys. 120-132
Applications I
- Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. 133-152 - John Lyle:
Trustable Remote Verification of Web Services. 153-168 - Jun Ho Huh, John Lyle:
Trustworthy Log Reconciliation for Distributed Virtual Organisations. 169-182 - Sven Türpe
, Andreas Poller, Jan Steffan
, Jan-Peter Stotz, Jan Trukenmüller:
Attacking the BitLocker Boot Process. 183-196
Applications II
- Steffen Schulz, Ahmad-Reza Sadeghi:
Secure VPNs for Trusted Computing Environments. 197-216 - Christopher Soghoian, Imad Aad:
Merx: Secure and Privacy Preserving Delegated Payments. 217-239 - Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan
:
A Property-Dependent Agent Transfer Protocol. 240-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.