Abstract is missing.
- Trusted computing challengesLeendert van Doorn. 1 [doi]
- An integrated architecture for trusted computing for java enabled embedded devicesKurt Dietrich. 2-6 [doi]
- A trusted mobile phone reference architecturevia secure kernelXinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert. 7-14 [doi]
- Reconfigurable trusted computing in hardwareThomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf. 15-20 [doi]
- Linux kernel integrity measurement using contextual inspectionPeter Loscocco, Perry W. Wilson, J. Aaron Pendergrass, C. Durward McDonell. 21-29 [doi]
- Beyond secure channelsYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan. 30-40 [doi]
- Offline untrusted storage with immediate detection of forking and replay attacksMarten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas. 41-48 [doi]
- The insider threat in scalable distributed systems: algorithms, metrics and gapsYair Amirs. 49 [doi]
- Realizing property-based attestation and sealing with commonly available hard- and softwareUlrich Kühn, Marcel Selhorst, Christian Stüble. 50-57 [doi]
- Trust management for trusted computing platforms in web servicesAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. 58-62 [doi]
- Uclinux: a linux security module for trusted-computing-based usage controls enforcementDavid Kyle, José Carlos Brustoloni. 63-70 [doi]
- Flexible intrusion tolerant voting architectureSoontaree Tanaraksiritavorn, Shivakant Mishra. 71-74 [doi]