Author:
Petz Adam,Alexander Perry
Funder
National Security Agency
Defense Advanced Research Projects Agency
Publisher
Springer Science and Business Media LLC
Reference56 articles.
1. Aydemir B, Charguéraud A, Pierce BC, Pollack R, Weirich S (2008) Engineering formal metatheory. In: Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL ’08, ACM, New York, NY, USA, pp 3–15. http://doi.acm.org/10.1145/1328438.1328443
2. Berger S, Caceres R, Goldman K, Perez R, Sailer R, van Doorn L (2006) vTPM: Virtualizing the Trusted Platform Module, http://www.kiskeya.net/ramon/work/pubs/security06.pdf, iBM T. J. Watson Research Center, Hawthorne, NY 10532 USA
3. Brasser F, El Mahjoub B, Sadeghi AR, Wachsmann C, Koeberl P (2015) Tytan: Tiny trust anchor for tiny devices. In: Proceedings of the 52nd annual design automation conference. DAC ’15, Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2744769.2744922
4. Carpent X, Rattanavipanon N, Tsudik G (2017) ERASMUS: efficient remote attestation via self- measurement for unattended settings. CoRR arXiv:1707.09043
5. Challener D, Yoder K, Catherman R (2008) A practical guide to trusted computing. IBM Press, Indianapolis