The SCEAS System
Navigation Menu

Conferences in DBLP

2009 (conf/intrust/2009)

  1. On Design of a Trusted Software Base with Support of TPCM. [Citation Graph (, )][DBLP]

  2. External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing. [Citation Graph (, )][DBLP]

  3. A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (, )][DBLP]

  4. Remote Attestation on Function Execution (Work-in-Progress). [Citation Graph (, )][DBLP]

  5. Scalable Remote Attestation with Privacy Protection. [Citation Graph (, )][DBLP]

  6. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. [Citation Graph (, )][DBLP]

  7. SocialClouds: Concept, Security Architecture and Some Mechanisms. [Citation Graph (, )][DBLP]

  8. Privacy Enhanced Trusted Network Connect. [Citation Graph (, )][DBLP]

  9. Research on Multistage Interconnection Architecture and Collision Detection Model. [Citation Graph (, )][DBLP]

  10. Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]

  11. Trusted Integrity Measurement and Reporting for Virtualized Platforms. [Citation Graph (, )][DBLP]

  12. A Feather-Weight Application Isolation Model. [Citation Graph (, )][DBLP]

  13. Exploring Trust of Mobile Applications Based on User Behaviors. [Citation Graph (, )][DBLP]

  14. Trusted Firmware Services Based on TPM. [Citation Graph (, )][DBLP]

  15. Improved Cryptanalysis of the FOX Block Cipher. [Citation Graph (, )][DBLP]

  16. Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002