Kurt Dietrich

According to our database1, Kurt Dietrich authored at least 21 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A hijacker's guide to communication interfaces of the trusted platform module.
Comput. Math. Appl., 2013

2012
Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Structuring Modular Safety Software Certification by Using Common Criteria Concepts.
Proceedings of the 38th Euromicro Conference on Software Engineering and Advanced Applications, 2012

2011
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch., 2011

Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Anonymous Ticketing for NFC-Enabled Mobile Phones.
Proceedings of the Trusted Systems - Third International Conference, 2011

A Hijacker's Guide to the LPC Bus.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms.
Proceedings of the Communications and Multimedia Security, 2011

2010
Performance Optimizations for DAA Signatures on Java enabled Platforms.
J. Univers. Comput. Sci., 2010

On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms.
J. Univers. Comput. Sci., 2010

Anonymous RFID Authentication Using Trusted Computing Technologies.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks.
Proceedings of the Trusted Systems - Second International Conference, 2010

A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Anonymous Client Authentication for Transport Layer Security.
Proceedings of the Communications and Multimedia Security, 2010

Towards customizable, application specific mobile trusted modules.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Implementation Aspects of Mobile and Embedded Trusted Computing.
Proceedings of the Trusted Computing, 2009

Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
Secure Boot Revisited.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

An integrated architecture for trusted computing for java enabled embedded devices.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007


  Loading...