POSTER: Enhanced embedded device security by combining hardware-based trust mechanisms
暂无分享,去创建一个
Martin Schramm | Andreas Grzemba | Nicolai Kuntze | Karl Leidl | N. Kuntze | M. Schramm | Andreas Grzemba | K. Leidl
[1] Martin Schramm,et al. Trustworthy building blocks for a more secure embedded computing environment , 2011, 2011 International Conference on Applied Electronics.
[2] Martin Schramm,et al. The benefits of combining trusted computing with virtualization techniques , 2010, 2010 International Conference on Applied Electronics.
[3] Lin Yang,et al. Architecture for Secure SCADA System Based on IF-MAP Scheme , 2012 .
[4] Carsten Rudolph,et al. On the automatic establishment of security relations for devices , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[5] Carsten Rudolph,et al. Integrating trust establishment into routing protocols of today's MANETs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[6] 宗藤 誠治,et al. Trusted Network Connect - TPMの利用管理技術の動向 , 2007 .
[7] Carsten Rudolph,et al. Chapter 1 SCENARIOS FOR RELIABLE AND SECURE DIGITAL EVIDENCE , 2012 .
[8] Carsten Rudolph,et al. Interoperable device identification in Smart-Grid environments , 2011, 2011 IEEE Power and Energy Society General Meeting.