Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/trust/trust2008.bht:"
@inproceedings{DBLP:conf/trust/BottcherKH08, author = {Alexander B{\"{o}}ttcher and Bernhard Kauer and Hermann H{\"{a}}rtig}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Trusted Computing Serving an Anonymity Service}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {143--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_11}, doi = {10.1007/978-3-540-68979-9\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/BottcherKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BratusDSS08, author = {Sergey Bratus and Nihal D'Cunha and Evan R. Sparks and Sean W. Smith}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {TOCTOU, Traps, and Trusted Computing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {14--32}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_2}, doi = {10.1007/978-3-540-68979-9\_2}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BratusDSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/BrickellCL08, author = {Ernie Brickell and Liqun Chen and Jiangtao Li}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A New Direct Anonymous Attestation Scheme from Bilinear Maps}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {166--178}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_13}, doi = {10.1007/978-3-540-68979-9\_13}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/BrickellCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/England08, author = {Paul England}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Practical Techniques for Operating System Attestation}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_1}, doi = {10.1007/978-3-540-68979-9\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/England08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/EnglandL08, author = {Paul England and Jork L{\"{o}}ser}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Para-Virtualized {TPM} Sharing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {119--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_9}, doi = {10.1007/978-3-540-68979-9\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/EnglandL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HypponenHT08, author = {Konstantin Hypp{\"{o}}nen and Marko Hassinen and Elena Trichina}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Pseudonymous Mobile Identity Architecture Based on Government-Supported {PKI}}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {107--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_8}, doi = {10.1007/978-3-540-68979-9\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HypponenHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HypponenHT08a, author = {Konstantin Hypp{\"{o}}nen and Marko Hassinen and Elena Trichina}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Combining Biometric Authentication with Privacy-Enhancing Technologies}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {155--165}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_12}, doi = {10.1007/978-3-540-68979-9\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HypponenHT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LeungCM08, author = {Adrian Leung and Liqun Chen and Chris J. Mitchell}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {179--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_14}, doi = {10.1007/978-3-540-68979-9\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LeungCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MonateS08, author = {Benjamin Monate and Julien Signoles}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Slicing for Security of Code}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {133--142}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_10}, doi = {10.1007/978-3-540-68979-9\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/MonateS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchellekensTP08, author = {Dries Schellekens and Pim Tuyls and Bart Preneel}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Embedded Trusted Computing with Authenticated Non-volatile Memory}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {60--74}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_5}, doi = {10.1007/978-3-540-68979-9\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StrasserS08, author = {Mario Strasser and Heiko Stamer}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A Software-Based Trusted Platform Module Emulator}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {33--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_3}, doi = {10.1007/978-3-540-68979-9\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StrasserS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Thomborson08, author = {Clark D. Thomborson}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A Model for New Zealand's Identity Verification Service}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {92--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_7}, doi = {10.1007/978-3-540-68979-9\_7}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/Thomborson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VejdaTPW08, author = {Tobias Vejda and Ronald Toegl and Martin Pirker and Thomas Winkler}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Towards Trust Services for Language-Based Virtual Machines for Grid Computing}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {48--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_4}, doi = {10.1007/978-3-540-68979-9\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/VejdaTPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/WeigoldKHHBB08, author = {Thomas Weigold and Thorsten Kramp and Reto Hermann and Frank H{\"{o}}ring and Peter Buhler and Michael Baentsch}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {75--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_6}, doi = {10.1007/978-3-540-68979-9\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/WeigoldKHHBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2008, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9}, doi = {10.1007/978-3-540-68979-9}, isbn = {978-3-540-68978-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.