„Trusted Computing“
Suchergebnisse
1.000+ Treffer
-
Stand zur IT-Sicherheit deutscher Stromnetzbetreiber – technischer Bericht
-
Multidisciplinary Research and Practice for Information Systems – IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
-
On the Move to Meaningful Internet Systems: OTM 2015 Conferences – Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings
-
On the move to meaningful internet systems: OTM 2013 conferences – confederated international conferences: CoopIS, DOA-Trusted Cloud and ODBASE 2013, Graz, Austria, September 9 - 13, 2013 ; proceedings
-
Computer Safety, Reliability, and Security – SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings
-
Theory and practice of computer science – proceedings
-
Flagging Trusted Flaggers
-
Trusted Flagger als Gefahr für die Meinungsfreiheit
-
On (not) Trusting Trusted Hardware
-
Trusted Computing Platforms – TPM2.0 in Context
-
Multidisciplinary research and practice for informations systems – proceedings
-
Computer safety, reliability, and security – 32nd international conference
-
Wie schützt sich die Industrie vor Wirtschaftsspionage 4.0 – Innovatives Industrial Rights Management–Vertrauenswürdiger Datenaustausch in komplexen Wertschöpfungsnetzwerken der Automobilindustrie
-
Trust and trustworthy computing – 6th international conference ; proceedings
-
Privacy-preserving federated learning: Strengthening data protection and secure collaboration in healthcare
-
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use
-
Social Biases and Trust Learning in the Trust Game
-
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
-
Trust In Your Pockets: On the Security of Mobile Devices through Trusted Computing
-
Software Development for Supporting Trustworthiness Assessment in Computer-Mediated Introduction – A Requirements Engineering Approach