Author of the publication

Design and Implementation of a TCG-based Integrity Measurement Architecture.

, , , and . USENIX Security Symposium, page 223-238. USENIX, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: Embedded Security: Challenges and Concerns., and . IEEE Computer, 34 (10): 40-41 (2001)The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer., and . IBM Journal of Research and Development, 48 (3-4): 475-488 (2004)vTPM: Virtualizing the Trusted Platform Module., , , , , and . USENIX Security Symposium, USENIX Association, (2006)Secure coprocessor-based intrusion detection., , , , and . ACM SIGOPS European Workshop, page 239-242. ACM, (2002)Virtualization and Hardware-Based Security., , and . IEEE Security & Privacy, 6 (5): 24-31 (2008)Attestation-based policy enforcement for remote access., , , and . ACM Conference on Computer and Communications Security, page 308-317. ACM, (2004)Internet Security Incidents, a Survey within Dutch Organisations., , , and . WebNet, AACE, (1998)Towards Trustworthy Kiosk Computing., , , , , and . HotMobile, page 41-45. IEEE Computer Society, (2007)A Secure Java Virtual Machine.. USENIX Security Symposium, USENIX Association, (2000)Autonomic 802.11 Wireless LAN Security Auditing., , , and . IEEE Security & Privacy, 2 (3): 56-65 (2004)