Abstract is missing.
- Practical Techniques for Operating System AttestationPaul England. 1-13 [doi]
- TOCTOU, Traps, and Trusted ComputingSergey Bratus, Nihal D Cunha, Evan Sparks, Sean W. Smith. 14-32 [doi]
- A Software-Based Trusted Platform Module EmulatorMario Strasser, Heiko Stamer. 33-47 [doi]
- Towards Trust Services for Language-Based Virtual Machines for Grid ComputingTobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler. 48-59 [doi]
- Embedded Trusted Computing with Authenticated Non-volatile MemoryDries Schellekens, Pim Tuyls, Bart Preneel. 60-74 [doi]
- The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software AttacksThomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch. 75-91 [doi]
- A Model for New Zealand s Identity Verification ServiceClark D. Thomborson. 92-106 [doi]
- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKIKonstantin Hyppönen, Marko Hassinen, Elena Trichina. 107-118 [doi]
- Para-Virtualized TPM SharingPaul England, Jork Löser. 119-132 [doi]
- Slicing for Security of CodeBenjamin Monate, Julien Signoles. 133-142 [doi]
- Trusted Computing Serving an Anonymity ServiceAlexander Böttcher, Bernhard Kauer, Hermann Härtig. 143-154 [doi]
- Combining Biometric Authentication with Privacy-Enhancing TechnologiesKonstantin Hyppönen, Marko Hassinen, Elena Trichina. 155-165 [doi]
- A New Direct Anonymous Attestation Scheme from Bilinear MapsErnie Brickell, Liqun Chen, Jiangtao Li. 166-178 [doi]
- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)Adrian Leung, Liqun Chen, Chris J. Mitchell. 179-190 [doi]