Abstract is missing.
- Towards a Programmable TPMPaul England, Talha Tariq. 1-13 [doi]
- ACPI: Design Principles and ConcernsLoïc Duflot, Olivier Levillain, Benjamin Morin. 14-28 [doi]
- Implementation Aspects of Mobile and Embedded Trusted ComputingKurt Dietrich, Johannes Winter. 29-44 [doi]
- Modeling Trusted Computing Support in a Protection Profile for High Assurance Security KernelsHans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy. 45-62 [doi]
- Remote Attestation of Attribute Updates and Information Flows in a UCON SystemMohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali. 63-80 [doi]
- Measuring Semantic Integrity for Remote AttestationFabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli. 81-100 [doi]
- A PrivacyCA for Anonymity and TrustMartin Pirker, Ronald Toegl, Daniel Hein, Peter Danner. 101-119 [doi]
- Revocation of TPM KeysStefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf. 120-132 [doi]
- Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software ArchitectureTimothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel. 133-152 [doi]
- Trustable Remote Verification of Web ServicesJohn Lyle. 153-168 [doi]
- Trustworthy Log Reconciliation for Distributed Virtual OrganisationsJun Ho Huh, John Lyle. 169-182 [doi]
- Attacking the BitLocker Boot ProcessSven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller. 183-196 [doi]
- Secure VPNs for Trusted Computing EnvironmentsSteffen Schulz, Ahmad-Reza Sadeghi. 197-216 [doi]
- Merx: Secure and Privacy Preserving Delegated PaymentsChristopher Soghoian, Imad Aad. 217-239 [doi]
- A Property-Dependent Agent Transfer ProtocolEimear Gallery, Aarthi Nagarajan, Vijay Varadharajan. 240-263 [doi]