Author:
Shepherd Carlton,Akram Raja Naeem,Markantonakis Konstantinos
Publisher
Springer International Publishing
Reference22 articles.
1. Akram, R.N., Markantonakis, K., Mayes, K.: Recovering from a lost digital wallet. In: Embedded and Ubiquitous Computing, pp. 1615–1621. IEEE (2013)
2. Akram, R.N., Markantonakis, K., Mayes, K., Bonnefoi, P.F., Sauveron, D., Chaumette, S.: An efficient, secure and trusted channel protocol for avionics wireless networks. In: 35th Digital Avionics Systems Conference. IEEE (2016)
3. Lecture Notes in Computer Science;G Arfaoui,2015
4. Brickell, E., Li, J.: Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. Int. J. Inf. Priv. Secur. Integrity 1(1), 3–33 (2011)
5. Lecture Notes in Computer Science;L Chen,2011
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Formal Specification of Trusted Execution Environment APIs;Lecture Notes in Computer Science;2024
2. A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. TEE-based protection of cryptographic keys on embedded IoT devices;Annales Mathematicae et Informaticae;2021