History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 54 total

A hijacker’s guide to communication interfaces of the trusted platform module. (English)
Comput. Math. Appl. 65, No. 5, 748-761 (2013).
WorldCat.org
1
Affective Metacognitive Scaffolding and Enriched User Modelling for Experiential Training Simulators: A Follow-Up Study. (English)
EC-TEL, 396-409(2013)
WorldCat.org
2
Secure embedded platform with advanced process isolation and anonymity capabilities. (English)
Fischer-Hübner, Simone (ed.) et al., Trust, privacy and security in digital business. 9th international conference, TrustBus 2012, Vienna, Austria, September 3‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32286-0/pbk). Lecture Notes in Computer Science 7449, 238-239 (2012).
WorldCat.org
3
An initial evaluation of metacognitive scaffolding for experiential training simulators. (English)
Ravenscroft, Andrew (ed.) et al., 21st century learning for 21st century skills. 7th European conference of technology enhanced learning, EC-TEL 2012, Saarbrücken, Germany, September 18‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33262-3/pbk). Lecture Notes in Computer Science 7563, 23-36 (2012).
WorldCat.org
4
A hijacker’s guide to the LPC bus. (English)
Petkova-Nikova, Svetla (ed.) et al., Public key infrastructures, services and applications. 8th European workshop, EuroPKI 2011, Leuven, Belgium, September 15‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-29803-5/pbk). Lecture Notes in Computer Science 7163, 176-193 (2012).
WorldCat.org
5
A distributed agent-based approach for simulation-based optimization. (English)
Advanced Engineering InformaticsAdvanced Engineering Informatics 26, N0. 4, 814-832(2012)
WorldCat.org
6
Multitouch-Gestensteuerung für das neuartige Suchinterface DelViz. (English)
Mensch & Computer Workshopband, 477-480(2012)
WorldCat.org
7
Structuring Modular Safety Software Certification by Using Common Criteria Concepts. (English)
EUROMICRO-SEAA, 47-50(2012)
WorldCat.org
8
Assessing interactions in the brain with exact low-resolution electromagnetic tomography. (English)
Philos. Trans. R. Soc. Lond., Ser. A, Math. Phys. Eng. Sci. 369, No. 1952, 3768-3784 (2011).
WorldCat.org
9
Seamless integration of trusted computing into standard cryptographic frameworks. (English)
Chen, Liqun (ed.) et al., Trusted systems. Second international conference, INTRUST 2010, Beijing, China, December 13‒15, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-25282-2/pbk). Lecture Notes in Computer Science 6802, 1-25 (2011).
WorldCat.org
10
Implementation aspects of anonymous credential systems for mobile trusted platforms. (English)
De Decker, Bart (ed.) et al., Communications and multimedia security. 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19‒21, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24711-8/pbk). Lecture Notes in Computer Science 7025, 45-58 (2011).
WorldCat.org
11
Towards a trustworthy, lightweight cloud computing framework for embedded systems. (English)
McCune, Jonathan M. (ed.) et al., Trust and trustworthy computing. 4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22‒24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21598-8/pbk). Lecture Notes in Computer Science 6740, 16-32 (2011).
WorldCat.org
12
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices. (English)
Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25‒28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 84-98 (2011).
WorldCat.org
13
Tracking of Extended Objects and Group Targets Using Random Matrices. (English)
IEEE Transactions on Signal ProcessingIEEE Transactions on Signal Processing 59, N0. 4, 1409-1420(2011)
WorldCat.org
14
Immersive data grasping using the explore table. (English)
Tangible and Embedded Interaction, 419-420(2011)
WorldCat.org
15
Anonymous Ticketing for NFC-Enabled Mobile Phones. (English)
INTRUST, 66-83(2011)
WorldCat.org
16
Anonymous RFID authentication using trusted computing technologies. (English)
Ors Yalcin, Siddika Berna (ed.), Radio frequency identification: Security and privacy issues. 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8‒9, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16821-5/pbk). Lecture Notes in Computer Science 6370, 91-102 (2010).
WorldCat.org
17
A secure and practical approach for providing anonymity protection for trusted platforms. (English)
Soriano, Miguel (ed.) et al., Information and communications security. 12th international conference, ICICS 2010, Barcelona, Spain, December 15‒17, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17649-4/pbk). Lecture Notes in Computer Science 6476, 311-324 (2010).
WorldCat.org
18
Performance optimizations for DAA signatures on Java enabled platforms. (English)
J. UCS 16, No. 4, 519-529, electronic only (2010).
WorldCat.org
19
On reliable platform configuration change reporting mechanisms for trusted computing enabled platforms. (English)
J. UCS 16, No. 4, 507-518, electronic only (2010).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 54 total

Valid XHTML 1.0 Transitional Valid CSS!