Tree-formed verification data for trusted platforms (Englisch)
- Neue Suche nach: Schmidt, Andreas U.
- Neue Suche nach: Leicher, Andreas
- Neue Suche nach: Brett, Andreas
- Neue Suche nach: Shah, Yogendra
- Neue Suche nach: Cha, Inhyok
- Neue Suche nach: Schmidt, Andreas U.
- Neue Suche nach: Leicher, Andreas
- Neue Suche nach: Brett, Andreas
- Neue Suche nach: Shah, Yogendra
- Neue Suche nach: Cha, Inhyok
In:
Computers and Security
;
32
;
19-35
;
2012
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Tree-formed verification data for trusted platforms
-
Beteiligte:Schmidt, Andreas U. ( Autor:in ) / Leicher, Andreas ( Autor:in ) / Brett, Andreas ( Autor:in ) / Shah, Yogendra ( Autor:in ) / Cha, Inhyok ( Autor:in )
-
Erschienen in:Computers and Security ; 32 ; 19-35
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:02.09.2012
-
Format / Umfang:17 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 32
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity ProtocolToledo, Nerea / Higuero, Marivi / Astorga, Jasone / Aguado, Marina / Bonnin, Jean Marie et al. | 2012
- 19
-
Tree-formed verification data for trusted platformsSchmidt, Andreas U. / Leicher, Andreas / Brett, Andreas / Shah, Yogendra / Cha, Inhyok et al. | 2012
- 36
-
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networksTan, Hailun / Ostry, Diethelm / Zic, John / Jha, Sanjay et al. | 2012
- 56
-
Digital media triage with bulk data analysis and bulk_extractorGarfinkel, Simson L. et al. | 2012
- 73
-
The architecture of a digital forensic readiness management systemReddy, K. / Venter, H.S. et al. | 2012
- 90
-
Future directions for behavioral information security researchCrossler, Robert E. / Johnston, Allen C. / Lowry, Paul Benjamin / Hu, Qing / Warkentin, Merrill / Baskerville, Richard et al. | 2012
- 102
-
From keyloggers to touchloggers: Take the rough with the smoothDamopoulos, D. / Kambourakis, G. / Gritzalis, S. et al. | 2012
- 115
-
On the detection of desynchronisation attacks against security protocols that use dynamic shared secretsLasc, Ioana / Dojen, Reiner / Coffey, Tom et al. | 2012
- 130
-
Systematic bug finding and fault localization enhanced with input data trackingDeMott, Jared D. / Enbody, Richard J. / Punch, William F. et al. | 2012
- 158
-
Exploring attack graph for cost-benefit security hardening: A probabilistic approachWang, Shuzhen / Zhang, Zonghua / Kadobayashi, Youki et al. | 2012
- 170
-
EVIV: An end-to-end verifiable Internet voting systemJoaquim, Rui / Ferreira, Paulo / Ribeiro, Carlos et al. | 2012
- 192
-
LSB matching steganalysis based on patterns of pixel differences and random embeddingLerch-Hostalot, Daniel / Megías, David et al. | 2012
- 207
-
A universal system for fair non-repudiable certified e-mail without a trusted third partyPaulin, Alois / Welzer, Tatjana et al. | 2012
- 219
-
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfallsSchreuders, Z. Cliffe / McGill, Tanya / Payne, Christian et al. | 2012
- 242
-
Security-related behavior in using information systems in the workplace: A review and synthesisGuo, Ken H. et al. | 2012
- 252
-
A middleware approach for outsourcing data securelyJammalamadaka, Ravi Chandra / Gamboni, Roberto / Mehrotra, Sharad / Seamons, Kent / Venkatasubramanian, Nalini et al. | 2012
- 267
-
Hacking VoIPSoupionis, Yannis / Gritzalis, Dimitris et al. | 2012
- 268
-
Metasploit the Penetration Tester's GuideKandias, Miltiadis / Gritzalis, Dimitris et al. | 2012
- IFC
-
Editorial Board| 2012
- iii
-
Contents| 2012
- v
-
EditorialSpafford, Eugene H. et al. | 2013