EU - SEPIA - Secure, Embedded Platform with advanced Process Isolation and Anonymity Capabilities

  • Winter, Johannes (Co-Investigator (CoI))
  • Dietrich, Kurt (Co-Investigator (CoI))
  • Pirker, Martin (Co-Investigator (CoI))
  • Hein, Daniel (Co-Investigator (CoI))
  • Bloem, Roderick (Co-Investigator (CoI))
  • Tögl, Ronald (Co-Investigator (CoI))
  • Podesser, Siegfried (Co-Investigator (CoI))

Project: Research project

Filter
Conference paper

Search results

  • 2013

    Group Signatures on Mobile Devices: Practical Experiences

    Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, Trust and trustworthy computing: 6th international conference, TRUST 2013, London, UK, June 17-19, 2013 ; proceedings . Berlin; Heidelberg: Springer, p. 47-64 (Lecture Notes in Computer Science; vol. 7904).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Semi-Automated Prototyping of a TPM v2 Software and Hardware Simulation Platform

    Pirker, M. & Winter, J., 2013, (Accepted/In press) Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST). Berlin / Heidelberg: Springer Verlag, Vol. 7904. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Trusted Identity Management for Overlay Networks

    Kraxberger, S., Tögl, R., Pirker, M., Guijarro, E. P. & Millan, G. G., 2013, Information security practice and experience. Heidelberg: Springer, p. 16-30 (Lecture Notes in Computer Science; vol. 7863).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2012

    A flexible software development and emulation framework for ARM TrustZone

    Wiegele, P., Winter, J., Pirker, M. & Tögl, R., 2012, Trusted systems : third international conference, INTRUST 2011: revised selected papers. Berlin Heidelberg: Springer, Vol. 7222. p. 1-15 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms

    Pirker, M. & Slamanig, D., 2012, Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Washington, DC, USA: IEEE Computer Society, p. 1155-1160

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Experimenting with ARM TrustZone -- Or: How I Met Friendly Piece of Trusted Hardware

    Winter, J., 2012, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012. ., p. 1161-1166

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Lightweight Distributed Attestation for the Cloud

    Pirker, M., Winter, J. & Tögl, R., 2012, Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER). SciTePress, p. 580-585

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Lightweight Distributed Heterogeneous Attested Android Clouds

    Pirker, M., Winter, J. & Tögl, R., 2012, Proceedings of the 5th International Conference on Trust & Trustworthy Computing (TRUST). Berlin / Heidelberg: Springer Verlag, Vol. 7344. p. 122-141 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients

    Pirker, M., Slamanig, D. & Winter, J., 2012, Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS). Berlin / Heidelberg: Springer Verlag, Vol. 7384. p. 201-220 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Securing Mobile Agents for Crisis Management Support

    Hein, D., Tögl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H. & Hluchý, L., 2012, (Accepted/In press) Scalable Trusted Computing. Alpha, NJ: Sheridan Printing Co., Inc.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Waltzing the Bear, or: A Trusted Virtual Security Module

    Tögl, R., Reimair, F. & Pirker, M., 2012, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Berlin; Heidelberg: Springer Verlag, p. 145-160 (Lecture Notes in Computer Science; vol. 7868).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • 2011

    A Hijacker's Guide to the LPC bus

    Winter, J. & Dietrich, K., 2011, Proceedings of the 8th European Workshop on Public Key Infrastructures, Services, and Applications (EuroPKI '11). Springer, p. ?-? (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2010

    Anonymous Client Authentication for Transport Layer Security

    Dietrich, K., 2010, Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010: Proceedings. Berlin; Heidelberg: Springer Berlin - Heidelberg, p. 268-280 (Lecture Notes in Computer Science; vol. 6109).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms

    Dietrich, K. & Winter, J., 2010, (Accepted/In press) International Conference on Information and Communications Security. ., (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

    Wachsmann, C., Ahmad-Reza, S., Chen, L., Dietrich, K., Löhr, H. & Winter, J., 2010, (Accepted/In press) Information Security Conference. .

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks

    Reiter, A., Neubauer, G., Kapfenberger, M., Winter, J. & Dietrich, K., 2010, (Accepted/In press) Trusted Systems. ., (Lecture Notes in Computer Science; vol. 6802).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review