You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
6 years ago | |
|---|---|---|
| .. | ||
| IntroToTrustedComputing_full_10-24-2012 | 7 years ago | |
| TPM2.0 Reference | 7 years ago | |
| Barki-Practical DAA.pdf | 6 years ago | |
| Brickell-TPM1 DAA.pdf | 6 years ago | |
| Camenisch-Fixing TPM2 for Provably Secure Anonymous Attestation.pdf | 6 years ago | |
| Chen-TPM2 Digital Signatures.pdf | 6 years ago | |
| Kumar-TPM DAA.pdf | 6 years ago | |
| Practical Guide to TPM2.0.pdf | 7 years ago | |
| Rinner-Private Space Monitoring.pdf | 6 years ago | |
| Rinner-Towards Secure Key Generation.pdf | 6 years ago | |
| Rinner-Trusted Sensors.pdf | 6 years ago | |
| Rinner-Trustworthy Sensing.pdf | 6 years ago | |
| TSS_ESAPI_Version-0.9_Revision-04_reviewEND030918.pdf | 8 years ago | |
| Whitefield-ECC-Based DAA.pdf | 6 years ago | |
| Whitefield-Privacy-Enhanced Capabilities for VANETs using DAA.pdf | 6 years ago | |
| erc_B1.pdf | 7 years ago | |
| erc_B2.pdf | 7 years ago | |