Author:
Schellekens Dries,Wyseur Brecht,Preneel Bart
Reference29 articles.
1. Tamper resistant software: An implementation;Aucsmith,1996
2. Trusted Computing Platforms: TCPA Technology in Context;Balacheff,2002
3. Direct anonymous attestation;Brickell,2004
4. M. Ceccato, M.D. Preda, J. Nagra, C. Collberg, P. Tonella, Barrier slicing for remote software trusting, in: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM’07, September 30–October 1, Paris, France, 2007
5. Virtual leashing: Internet-based software piracy protection;Dvir,2005
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An seL4-based Trusted Execution Environment on RISC-V;2024 International Wireless Communications and Mobile Computing (IWCMC);2024-05-27
2. Secure Computing: NGSCB’s Journey and Windows Security Impact;2024 International Conference on Automation and Computation (AUTOCOM);2024-03-14
3. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. An Interoperable Zero Trust Federated Architecture for Tactical Systems;MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM);2023-10-30
5. Analysis of OSPU security effect and data assembly verification under semi-network OS architecture;International Journal of Information Security;2023-05-18