Author:
Fournaris Apostolos P.,Keramidas Georgios
Publisher
Springer International Publishing
Reference38 articles.
1. Challener, D., Yoder, K., Catherman, R., Safford, D., & Van Doorn, L. (2007). A practical guide to trusted computing. Boston: IBM press.
2. Anderson, R., Bond, M., Clulow, J., & Skorobogatov, S. (2006). Cryptographic processors-a survey. Proceedings of the IEEE, vol. 94, 2, pp. 357–369.
3. PracTel Inc. (2007). Tetra and tetrapol: Technology and market comparison. PracTel Inc.
4. Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2), 58–71.
5. Gligor, V., & Wing, J. M. (2011). Towards a theory of trust in networks of humans and computers. Security Protocols XIX. Springer, pp. 223–242.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献