1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Implementation of Trusted Computing -- Towards a Programmable TPM -- ACPI: Design Principles...

2
by Proudler, Graeme, Chen, Liqun, Dalton, Chris
Published 2014
Springer International Publishing
Table of Contents: ...Introduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms...

3
Published 2020
Springer International Publishing
Table of Contents: ... and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter...

4
Published 2020
Springer International Publishing
Table of Contents: ...-factorable keys -- MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation -- Evaluating...

5
Published 2018
Springer International Publishing
Table of Contents: ... Responses -- Outsourcing and Assisted Computing -- Enforcing Access Control for the Cryptographic Cloud...

6
Published 2014
Springer International Publishing
Subjects: ...Computer Communication Networks...

7
Published 2015
Springer International Publishing
Subjects: ...Computer Communication Networks...

8
Published 2022
Springer International Publishing
Subjects: ...Computer vision...

9
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Attacks --  Fault Detection of the MacGuffin Cipher against Differential Fault Attack -- Computationally...

10
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer science / Mathematics...

11
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

12
Published 2008
Springer Berlin Heidelberg
Subjects: ...Computer programming...

13
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic...

14
Published 2018
Springer International Publishing
Subjects: ...Computer Communication Networks...

15
Published 2016
Springer International Publishing
Subjects: ...Computers and Society...

16
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation...

17
Published 2016
Springer International Publishing
Subjects: ...Data encryption (Computer science)...