TRUST 2008.- Practical Techniques for Operating System Attestation.- TOCTOU, Traps, and Trusted Computing.- A Software-Based Trusted Platform Module Emulator.- Towards Trust Services for Language-Based Virtual Machines for Grid Computing.- Embedded Trusted Computing with Authenticated Non-volatile Memory.- The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks.- A Model for New Zealand’s Identity Verification Service.- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI.- Para-Virtualized TPM Sharing.- Slicing for Security of Code.- Trusted Computing Serving an Anonymity Service.- Combining Biometric Authentication with Privacy-Enhancing Technologies.- A New Direct Anonymous Attestation Scheme from Bilinear Maps.- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Ask a Question About this Product More... |