书目详情:
PUF-Based Software Protection for Low-End Embedded DevicesWhy Attackers Win: On the Learnability of XOR Arbiter PUFsA Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0On Making Emerging Trusted Execution Environments Accessible to DevelopersComputing Trust Levels Based on User’s Personality and Observed System TrustworthinessEnhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk AwarenessTrustworthy Memory Isolation of Linux on Embedded DevicesLookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive ModelingRipple: Overview and OutlookTime to Rethink: Trust Brokerage Using Trusted Execution EnvironmentsREWIRE – Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc NetworksDAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZoneDAA-A: Direct Anonymous Attestation with AttributesProposed Processor Extensions for Significant Speedup of Hypervisor Memory IntrospectionMWA Skew SRAM Based SIMPL Systems for Public-Key Physical CryptographySecure Erasure and Code Update in Legacy SensorsEfficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications
评论:

