Author of the publication

Towards a Verified Reference Implementation of a Trusted Platform Module.

, , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In AI We Trust: Ethics, Artificial Intelligence, and Reliability.. Sci. Eng. Ethics, 26 (5): 2749-2767 (2020)The Future of Transportation: Ethical, Legal, Social and Economic Impacts of Self-driving Vehicles in the Year 2025.. Sci. Eng. Ethics, 26 (3): 1185-1208 (2020)Belief Revision and Verisimilitude., and . Notre Dame J. Formal Log., 36 (1): 15-29 (1995)Artificial intelligence ethics guidelines for developers and users: clarifying their content and normative implications., and . J. Inf. Commun. Ethics Soc., 19 (1): 61-86 (2021)SoK: TEE-assisted Confidential Smart Contract., , , , and . CoRR, (2022)Untraceability in the applied pi-calculus., , , and . ICITST, page 1-6. IEEE, (2009)A Trusted Infrastructure for P2P-based Marketplaces., , and . Peer-to-Peer Computing, page 151-154. IEEE, (2009)Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 89-108. Springer, (2012)Towards a Verified Reference Implementation of a Trusted Platform Module., , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)Approximating ATL* in ATL., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 289-301. Springer, (2002)