Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004. ,
DOI : 10.1145/1030083.1030103
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5041
Analyzing Privacy Designs of Mobile Social Networking Applications, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.83-88, 2008. ,
DOI : 10.1109/EUC.2008.156
A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels, 2008 The 9th International Conference for Young Computer Scientists, pp.2137-2142, 2008. ,
DOI : 10.1109/ICYCS.2008.530
IP over P2P: enabling self-configuring virtual IP networks for grid computing, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006. ,
DOI : 10.1109/IPDPS.2006.1639287
Linking remote attestation to secure tunnel endpoints, Proceedings of the first ACM workshop on Scalable trusted computing , STC '06, pp.21-24, 2006. ,
DOI : 10.1145/1179474.1179481
Trusted Ticket Systems and Applications, Proceedings of the IFIP sec2007, pp.14-16, 2007. ,
DOI : 10.1007/978-0-387-72367-9_5
URL : http://arxiv.org/abs/cs/0701144
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA), 2007. ,
DOI : 10.1007/978-3-540-68979-9_14
Trusted Computing Platforms, the Next Security Solution, Bristol UK: HP Laboratories, 2002. ,
Identifying Trustworthy Hosts Using Remote Attestation (accessed on 31, 2010. ,
Covert Identity Information in Direct Anonymous Attestation (DAA) IFIP Security, p.443, 2007. ,
TPM Virtualization: Building a General Framework, 2007. ,
DOI : 10.1007/978-3-8348-9452-6_4
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment, Proceedings of The Second Annual Workshop on Economics and Information Security, pp.29-30, 2003. ,
DOI : 10.1007/1-4020-8090-5_5
On the Deployment of Mobile Trusted Modules, 2008 IEEE Wireless Communications and Networking Conference, pp.3169-3174, 2008. ,
DOI : 10.1109/WCNC.2008.553
Improving the scalability of platform attestation, Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC '08, pp.1-10, 2008. ,
DOI : 10.1145/1456455.1456457
A Robust Integrity Reporting Protocol for Remote Attestation, Proceedings of the Workshop on Advances in Trusted Computing (WATC), 2006. ,
A virtual network (ViNe) architecture for grid computing, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006. ,
DOI : 10.1109/IPDPS.2006.1639380
Trusted computing building blocks for embedded linux-based ARM trustzone platforms, Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC '08, pp.21-30, 2008. ,
DOI : 10.1145/1456455.1456460
On the Design of Virtual Machine Sandboxes for Distributed Computing in Wide-area Overlays of Virtual Workstations, First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006), p.8, 2006. ,
DOI : 10.1109/VTDC.2006.8