The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007stc)

  1. Trusted computing challenges. [Citation Graph (, )][DBLP]

  2. An integrated architecture for trusted computing for java enabled embedded devices. [Citation Graph (, )][DBLP]

  3. A trusted mobile phone reference architecturevia secure kernel. [Citation Graph (, )][DBLP]

  4. Reconfigurable trusted computing in hardware. [Citation Graph (, )][DBLP]

  5. Linux kernel integrity measurement using contextual inspection. [Citation Graph (, )][DBLP]

  6. Beyond secure channels. [Citation Graph (, )][DBLP]

  7. Offline untrusted storage with immediate detection of forking and replay attacks. [Citation Graph (, )][DBLP]

  8. The insider threat in scalable distributed systems: algorithms, metrics and gaps. [Citation Graph (, )][DBLP]

  9. Realizing property-based attestation and sealing with commonly available hard- and software. [Citation Graph (, )][DBLP]

  10. Trust management for trusted computing platforms in web services. [Citation Graph (, )][DBLP]

  11. Uclinux: a linux security module for trusted-computing-based usage controls enforcement. [Citation Graph (, )][DBLP]

  12. Flexible intrusion tolerant voting architecture. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002