Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Framework for security and privacy in automotive telematics., , , , , , and . Workshop Mobile Commerce, page 25-32. ACM, (2002)Secure coprocessor-based intrusion detection., , , , and . ACM SIGOPS European Workshop, page 239-242. ACM, (2002)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 40-47 (2008)vTPM: Virtualizing the Trusted Platform Module., , , , , and . USENIX Security Symposium, USENIX Association, (2006)Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control., , and . ACSAC, page 221-231. IEEE Computer Society, (2007)Silicon systems security and building a root of trust.. A-SSCC, page 1-4. IEEE, (2015)Linking remote attestation to secure tunnel endpoints., , and . STC, page 21-24. ACM, (2006)Building the IBM 4758 Secure Coprocessor., , , , , , and . Computer, 34 (10): 57-66 (2001)Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor., , , , , , , and . ACSAC, page 276-285. IEEE Computer Society, (2005)Building Institutional Capacity for Learning Analytics: Top-Down & Bottom-up initiatives, , , and . IEEE Revista Iberoamericana de Tecnologias del Aprendizaje, (2022)