Cited By
View all- Khan IAnwar ZBordbar BRitter ERehman H(2018)A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service CloudsIEEE Transactions on Cloud Computing10.1109/TCC.2016.25601616:4(942-954)Online publication date: 1-Oct-2018
- Seol JJin SLee DHuh JMaeng S(2016)A Trusted IaaS Environment with Hardware Security ModuleIEEE Transactions on Services Computing10.1109/TSC.2015.23920999:3(343-356)Online publication date: 1-May-2016
- Toegl RWinkler TNauman MHong TWinter JGissing M(2014)Programming Interfaces for the TPMTrusted Computing for Embedded Systems10.1007/978-3-319-09420-5_1(3-32)Online publication date: 3-Nov-2014
- Show More Cited By