Author:
England Paul,Peinado Marcus
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. DOD 5200.28-STD. Department of defense trusted computer system evaluation criteria. December 1985.
2. Trusted Computing Platform Alliance. TCPA main specification version 1.1. http://www.trustedpc.org , 2001.
3. W. A. Arbaugh, D. J. Faber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 65–71, 1997.
4. Lect Notes Comput Sci;D. Aucsmith,1996
5. B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology-CRYPTO 2001, pages 1–18. Springer-Verlag, 2001.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards a Programmable TPM;Lecture Notes in Computer Science;2009
2. Protecting Patient Records from Unwarranted Access;Future of Trust in Computing;2009
3. NGSCB: A Trusted Open System;Information Security and Privacy;2004
4. A Logical Account of NGSCB;Lecture Notes in Computer Science;2004
5. Practical Techniques for Operating System Attestation;Trusted Computing - Challenges and Applications