Team for Research in
Ubiquitous Secure Technology

Experimental Embedded System Platform for System/Security Co-Design
Matthew Eby, Janos Laszlo Mathe, Jan Werner, Janos Sztipanovits, Gabor Karsai, Yuan Xue

Citation
Matthew Eby, Janos Laszlo Mathe, Jan Werner, Janos Sztipanovits, Gabor Karsai, Yuan Xue. "Experimental Embedded System Platform for System/Security Co-Design". Talk or presentation, January, 2006; Poster presented at the TRUST Review Meeting.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Matthew Eby, Janos Laszlo Mathe, Jan Werner, Janos
    Sztipanovits, Gabor Karsai, Yuan Xue. <a
    href="http://www.truststc.org/pubs/532.html"
    ><i>Experimental Embedded System Platform for
    System/Security Co-Design</i></a>, Talk or
    presentation,  January, 2006; Poster presented at the TRUST
    Review Meeting.
  • Plain text
    Matthew Eby, Janos Laszlo Mathe, Jan Werner, Janos
    Sztipanovits, Gabor Karsai, Yuan Xue. "Experimental
    Embedded System Platform for System/Security
    Co-Design". Talk or presentation,  January, 2006;
    Poster presented at the TRUST Review Meeting.
  • BibTeX
    @presentation{EbyMatheWernerSztipanovitsKarsaiXue06_ExperimentalEmbeddedSystemPlatformForSystemSecurity,
        author = {Matthew Eby and Janos Laszlo Mathe and Jan Werner
                  and Janos Sztipanovits and Gabor Karsai and Yuan
                  Xue},
        title = {Experimental Embedded System Platform for
                  System/Security Co-Design},
        month = {January},
        year = {2006},
        note = {Poster presented at the TRUST Review Meeting},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/532.html}
    }
    

Posted by Janos Laszlo Mathe on 5 Feb 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.