![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
2nd STC@CCS 2007: Alexandria, VA, USA
- Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-888-6
Invited talk I
- Leendert van Doorn:
Trusted computing challenges. 1
Mobile and embedded trusted computing
- Kurt Dietrich:
An integrated architecture for trusted computing for java enabled embedded devices. 2-6 - Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
A trusted mobile phone reference architecturevia secure kernel. 7-14 - Thomas Eisenbarth
, Tim Güneysu
, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf
:
Reconfigurable trusted computing in hardware. 15-20
Trusted platform, channel, and storage
- Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, C. Durward McDonell:
Linux kernel integrity measurement using contextual inspection. 21-29 - Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan
:
Beyond secure channels. 30-40 - Marten van Dijk
, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas:
Offline untrusted storage with immediate detection of forking and replay attacks. 41-48
Invited talk II
- Yair Amir:
The insider threat in scalable distributed systems: algorithms, metrics and gaps. 49
Property-based attestation
- Ulrich Kühn, Marcel Selhorst, Christian Stüble:
Realizing property-based attestation and sealing with commonly available hard- and software. 50-57 - Aarthi Nagarajan, Vijay Varadharajan
, Michael Hitchens
:
Trust management for trusted computing platforms in web services. 58-62
Applications
- David Kyle, José Carlos Brustoloni:
Uclinux: a linux security module for trusted-computing-based usage controls enforcement. 63-70 - Soontaree Tanaraksiritavorn, Shivakant Mishra:
Flexible intrusion tolerant voting architecture. 71-74
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.