Author:
Gopalan Anandha,Gowadia Vaibhav,Scalavino Enrico,Lupu Emil
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Alawneh, M., Abbadi, I.M.: Sharing but protecting content against internal leakage for organisations. In: DBSec, pp. 238–253 (2008)
2. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004)
3. Ceccato, M., Preda, M., Nagra, J., Collberg, C., Tonella, P.: Barrier slicing for remote software trusting. In: Seventh IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007, September 30-October 1, pp. 27–36 (2007)
4. Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, New York, NY, USA, pp. 7–16 (2006)
5. Consequence Project,
http://www.consequence-project.eu/
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献