Stanford CIS
Stefan Bechtold

Stefan Bechtold

Recent articles

Blog

The paternalistic paternalism of TC

Seth Schoen has posted a very interesting blog entry about some trends in the trusted computing research community according to which educating users about comp…

Blog

TPM Matrix

Tony McFadden, TPM Matrix. List of known TPM manufacturers and implementations. 2005.…

Blog

Pearson Policy

Siani Pearson, Trusted Computing: Strenghts, Weaknesses and Further Opportunities for Enhancing Privacy, in: Herrmann et al. (eds.), iTrust 2005, Proceedings, S…

Blog

Property-based Sealing

Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…

Blog

Ahmad Property-based sealing

Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi & Christian Stüble: Secure Data Management in Trusted Computing. In: Proceedings of the Worksho…

Blog

Shi BIND

Elaine Shi, Adrian Perrig & Leendert Van Doorn, BIND: A Fine-grained Attestation Service for Secure Distributed Systems, in: Proceedings of the 2005 IEEE Sy…

Blog

Schoen 2005

Seth Schoen, Compatibility, competition, and control in trusted computing environments, Information Security Technical Report (2005) 10, 105-119…

Blog

Sadeghi Perseus

Ahmad-Reza Sadeghi & Christian Stüble, Towards multilaterally secure computing platforms - with open source and trusted computing, Information Security Tech…

Blog

Safford Open Source

David Safford & Mimi Zohar, Trusted computing and open source, Information Security Technical Report (2005) 10, 74-82.…

Blog

Smith, TC Book

Sean Smith, Trusted Computing Platforms - Design and Applications, Springer 2005.…