„Trusted computing“
Suchergebnisse
559 Treffer
-
The Trust-Enabling Middleware: Introduction and Application
-
Towards trustworthy usage of indoor positioning data in manufacturing simulation
-
10141 Summary – Distributed Usage Control
-
10141 Abstracts Collection – Distributed Usage Control
-
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092)
-
A cluster of patterns for trusted computing
-
Trusted Computing : eine universelle Sicherheitsplattform kann Marktzutritt beschränken
-
Trusted Computing and Information Security – 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
-
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen)
-
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
-
Trust in the context of subscription contracts
-
A hybrid flow-based intrusion detection system incorporating uncertainty
-
Information security and privacy research – proceedings
-
Trust and trustworthy computing – third international conference ; proceedings
-
Eignung von Cloud-Lösungen als Unternehmensressource unter Berücksichtigung von Datenschutz und Compliance
-
Trustworthy global computing – second symposium ; revised selected papers
-
Modes of operation for compressed sensing based encryption
-
Information security applications – 8th international workshop ; revised selected papers
-
Secure data management – proceedings
-
Wireless and mobile networking – second IFIP WG 6.8 joint conference ; proceedings