Author:
Schellekens Dries,Wyseur Brecht,Preneel Bart
Subject
General Computer Science,Theoretical Computer Science
Reference25 articles.
1. Tamper Resistant Software: An Implementation;Aucsmith,1996
2. Trusted Computing Platforms: TCPA Technology in Context;Balacheff,2002
3. Direct anonymous attestation;Brickell,2004
4. Ceccato, M., M. D. Preda, J. Nagra, C. Collberg and P. Tonella, Barrier Slicing for Remote Software Trusting, in: 7th IEEE International Working Conference on Source Code Analysis and MAnipulation (SCAM'07), September 30 - October 1, Paris, France, 2007
5. Dvir, O., M. Herlihy and N. N. Shavit, Virtual Leashing: Internet-Based Software Piracy Protection, in: ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) (2005), pp. 283–292
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Delegated attestation;Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2021-06-28
2. Dynamic Remote Attestation on CP-ABE Algorithm;Applied Mechanics and Materials;2014-11
3. Dynamic Remote Attestation on Trusted Computing;Applied Mechanics and Materials;2014-11
4. Research on Dynamic Integrity Measurement Model Based on Memory Paging Mechanism;Discrete Dynamics in Nature and Society;2014
5. Research on the encryption and digital signatures in remote attestation from elliptic curve group;Applied Mathematics & Information Sciences;2013-05-01