From post

Innovations for Grid Security from Trusted Computing.

, , , и . Security Protocols Workshop, том 5087 из Lecture Notes in Computer Science, стр. 132-149. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formalizing Trust Requirements and Specification in Service Workflow Environments., и . ICEIS (3), стр. 196-206. SciTePress, (2011)Analysis of Trusted Execution Environment usage in Samsung KNOX., , , , и . SysTEX@Middleware, стр. 7:1-7:6. ACM, (2016)Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices., , , и . CoRR, (2016)RepCloud: Attesting to Cloud Service Dependency., и . IEEE Trans. Serv. Comput., 10 (5): 675-688 (2017)A verification system for interval-based specification languages., , , и . ACM Trans. Softw. Eng. Methodol., 19 (4): 13:1-13:36 (2010)KEDS: Decentralised Network Security for the Smart Home Environment., и . SmartGridSec, том 8448 из Lecture Notes in Computer Science, стр. 63-78. Springer, (2014)Towards an open, trusted digital rights management platform., и . Digital Rights Management Workshop, стр. 79-88. ACM, (2006)Innovations for Grid Security from Trusted Computing., , , и . Security Protocols Workshop, том 5087 из Lecture Notes in Computer Science, стр. 132-149. Springer, (2006)W Reconstructed., и . ZUM, том 1212 из Lecture Notes in Computer Science, стр. 115-134. Springer, (1997)On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis., , , и . UCC, стр. 217-226. IEEE Computer Society, (2015)