Author:
Toegl Ronald,Winkler Thomas,Nauman Mohammad,Hong Theodore W.,Winter Johannes,Gissing Michael
Publisher
Springer International Publishing
Reference84 articles.
1. Ables, K.: An alleged attack on key delegation in the trusted platform module. MSc Advanced Computer Science First Semester Mini-Project, University of Birmingham (2009).
http://www.computer-science.birmingham.ac.uk/~mdr/research/papers/pdf/09-ables-3.pdf
. Website accessed 15 Nov 2012
2. Alam, M., Zhang, X., Nauman, M., Ali, T.: Behavioral attestation for web services (ba4ws). In: Proceedings of the 2008 ACM Workshop on Secure Web Services, Alexandria, pp. 21–28. ACM (2008). doi:
10.1145/1456492.1456496
3. Alsouri, S., Dagdelen, O., Katzenbeisser, S.: Group-based attestation: enhancing privacy and management in remote attestation. In: Acquisti, A., Smith, S., Sadeghi A.R. (eds.) Trust and Trustworthy Computing. Lecture Notes in Computer Science, vol. 6101, pp. 63–77. Springer, Berlin/Heidelberg (2010).
http://dx.doi.org/10.1007/978-3-642-13869-0_5
4. Baldwin, A., Dalton, C., Shiu, S., Kostienko, K., Rajpoot, Q.: Providing secure services for a virtual infrastructure. SIGOPS Oper. Syst. Rev. 43(1), 44–51 (2009). doi:
10.1145/1496909.1496919
5. Bangerter, E., Djackov, M., Sadeghi, A.R.: A demonstrative ad hoc attestation system. In: Wu, T.C., Lei, C.L., Rijmen, V., Lee D.T. (eds.) Information Security. Lecture Notes in Computer Science, vol. 5222, pp. 17–30. Springer, Berlin/Heidelberg (2008).
http://dx.doi.org/10.1007/978-3-540-85886-7_2