Abstract is missing.
- Improving the scalability of platform attestationFrederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert. 1-10 [doi]
- Remote attestation on program executionLiang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei. 11-20 [doi]
- Trusted computing building blocks for embedded linux-based ARM trustzone platformsJohannes Winter. 21-30 [doi]
- A fast real-time memory authentication protocolYin Hu, Ghaith Hammouri, Berk Sunar. 31-40 [doi]
- An efficient implementation of trusted channels based on opensslFrederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi. 41-50 [doi]
- Improving coherency of runtime integrity measurementMark Thober, J. Aaron Pendergrass, C. Durward McDonell. 51-60 [doi]
- Scheduling execution of credentials in constrained secure environmentsJan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala. 61-70 [doi]
- Flexible and secure enterprise rights management based on trusted virtual domainsYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble. 71-80 [doi]
- e-EMV: emulating EMV for internet payments with trusted computing technologiesShane Balfe, Kenneth G. Paterson. 81-92 [doi]