Author:
Sadeghi Ahmad-Reza,Wachsmann Christian
Reference105 articles.
1. A. Alkassar, M. Scheibel, A.R. Sadeghi, C. Stble, and M. Winandy .Security architecture for device encryption and VPN. In S. Paulus, N. Pohlmann, and H. Reimer, editors ,ISSE 2006 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2006 Conference, pages54 -63 .Vieweg Verlag,2006 .
2. R. J. Anderson Cryptography and competition policy - issues with trusted computing . InProceedings of PODC'03,July13-16,2003 ,Boston, Massachsetts, pages 3-10. ACM Press, 2003.
3. W. A. Arbaugh, D. J. Farber, and J. M. Smith .A secure and reliable bootstrap architecture . InProceedings of the IEEE Symposium on Research in Security and Privacy, pages65 -71 ,Oakland, CA,May1997 . IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.