Filter your results
- 7
- 7
- 7
- 1
- 1
- 1
- 1
- 3
- 7
- 1
- 3
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Runtime Firmware Product Lines Using TPM2.032th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.248-261, ⟨10.1007/978-3-319-58469-0_17⟩
Conference papers
hal-01649005v1
|
||
|
A Formal Notion of Trust - Enabling Reasoning about Security Properties4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.200-215, ⟨10.1007/978-3-642-13446-3_14⟩
Conference papers
hal-01061328v1
|
||
|
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-102, ⟨10.1007/978-3-642-15257-3_9⟩
Conference papers
hal-01054578v1
|
||
|
Secure Attestation of Virtualized Environments35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.203-216, ⟨10.1007/978-3-030-58201-2_14⟩
Conference papers
hal-03440811v1
|
||
|
Preserving Confidentiality in Component Compositions12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.33-48, ⟨10.1007/978-3-642-39614-4_3⟩
Conference papers
hal-01492775v1
|
||
|
Trust in Peer-to-Peer Content Distribution Protocols4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers
hal-01056065v1
|
||
|
Advanced Remote Firmware Upgrades Using TPM 2.031st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.276-289, ⟨10.1007/978-3-319-33630-5_19⟩
Conference papers
hal-01369561v1
|