Search dblp for Publications

export results for "toc:db/conf/trust/trust2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trust/BottcherKH08,
  author       = {Alexander B{\"{o}}ttcher and
                  Bernhard Kauer and
                  Hermann H{\"{a}}rtig},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Trusted Computing Serving an Anonymity Service},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_11},
  doi          = {10.1007/978-3-540-68979-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BottcherKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BratusDSS08,
  author       = {Sergey Bratus and
                  Nihal D'Cunha and
                  Evan R. Sparks and
                  Sean W. Smith},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {TOCTOU, Traps, and Trusted Computing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {14--32},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_2},
  doi          = {10.1007/978-3-540-68979-9\_2},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BratusDSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/BrickellCL08,
  author       = {Ernie Brickell and
                  Liqun Chen and
                  Jiangtao Li},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A New Direct Anonymous Attestation Scheme from Bilinear Maps},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {166--178},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_13},
  doi          = {10.1007/978-3-540-68979-9\_13},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/BrickellCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/England08,
  author       = {Paul England},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Practical Techniques for Operating System Attestation},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_1},
  doi          = {10.1007/978-3-540-68979-9\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/England08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/EnglandL08,
  author       = {Paul England and
                  Jork L{\"{o}}ser},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Para-Virtualized {TPM} Sharing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_9},
  doi          = {10.1007/978-3-540-68979-9\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/EnglandL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HypponenHT08,
  author       = {Konstantin Hypp{\"{o}}nen and
                  Marko Hassinen and
                  Elena Trichina},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Pseudonymous Mobile Identity Architecture Based on Government-Supported
                  {PKI}},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_8},
  doi          = {10.1007/978-3-540-68979-9\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HypponenHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HypponenHT08a,
  author       = {Konstantin Hypp{\"{o}}nen and
                  Marko Hassinen and
                  Elena Trichina},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Combining Biometric Authentication with Privacy-Enhancing Technologies},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_12},
  doi          = {10.1007/978-3-540-68979-9\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HypponenHT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LeungCM08,
  author       = {Adrian Leung and
                  Liqun Chen and
                  Chris J. Mitchell},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {179--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_14},
  doi          = {10.1007/978-3-540-68979-9\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LeungCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MonateS08,
  author       = {Benjamin Monate and
                  Julien Signoles},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Slicing for Security of Code},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {133--142},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_10},
  doi          = {10.1007/978-3-540-68979-9\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MonateS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchellekensTP08,
  author       = {Dries Schellekens and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Embedded Trusted Computing with Authenticated Non-volatile Memory},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_5},
  doi          = {10.1007/978-3-540-68979-9\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StrasserS08,
  author       = {Mario Strasser and
                  Heiko Stamer},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A Software-Based Trusted Platform Module Emulator},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_3},
  doi          = {10.1007/978-3-540-68979-9\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StrasserS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson08,
  author       = {Clark D. Thomborson},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A Model for New Zealand's Identity Verification Service},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_7},
  doi          = {10.1007/978-3-540-68979-9\_7},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/VejdaTPW08,
  author       = {Tobias Vejda and
                  Ronald Toegl and
                  Martin Pirker and
                  Thomas Winkler},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Towards Trust Services for Language-Based Virtual Machines for Grid
                  Computing},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {48--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_4},
  doi          = {10.1007/978-3-540-68979-9\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/VejdaTPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/WeigoldKHHBB08,
  author       = {Thomas Weigold and
                  Thorsten Kramp and
                  Reto Hermann and
                  Frank H{\"{o}}ring and
                  Peter Buhler and
                  Michael Baentsch},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {The Zurich Trusted Information Channel - An Efficient Defence Against
                  Man-in-the-Middle and Malicious Software Attacks},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {75--91},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_6},
  doi          = {10.1007/978-3-540-68979-9\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/WeigoldKHHBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2008,
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9},
  doi          = {10.1007/978-3-540-68979-9},
  isbn         = {978-3-540-68978-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics