A study on migration scheme for a mobile trusted module
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Power efficient hardware architecture of SHA-1 algorithm for trusted mobile computing
ICICS'07 Proceedings of the 9th international conference on Information and communications security
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Application of trusted computing in automation to prevent product piracy
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Run-time prediction and preemption of configuration attacks on embedded process controllers
Proceedings of the First International Conference on Security of Internet of Things
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Hi-index | 0.00 |