Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms.. J. UCS, 16 (4): 507-518 (2010)Towards customizable, application specific mobile trusted modules., and . STC@CCS, page 31-40. ACM, (2010)Implementation Aspects of Mobile and Embedded Trusted Computing., and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 29-44. Springer, (2009)Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems., and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 16-32. Springer, (2011)Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities., , , , , , , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 238-239. Springer, (2012)An integrated architecture for trusted computing for java enabled embedded devices.. STC, page 2-6. ACM, (2007)A hijacker's guide to communication interfaces of the trusted platform module., and . Computers & Mathematics with Applications, 65 (5): 748-761 (2013)Performance Optimizations for DAA Signatures on Java enabled Platforms., and . J. UCS, 16 (4): 519-529 (2010)Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices., , , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 84-98. Springer, (2010)A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels.. ICYCS, page 2137-2142. IEEE Computer Society, (2008)