Results 131 to 140 of about 150,216 (340)

Challenges for Trusted Computing [PDF]

open access: yes, 2006
The Trusted Computing Group (TCG), an alliance of a large number of IT enterprises, has published a set of specifications aiming at cost-efficient extensions of conventional computer architectures with security-related features and cryptographic mechanisms.
openaire   +1 more source

Application-Oriented Trust in Distributed Computing [PDF]

open access: green, 2008
Riccardo Scandariato   +3 more
openalex   +1 more source

HARMLESS Early Warning System for Advanced Materials

open access: yesAdvanced Sustainable Systems, EarlyView.
The HARMLESS Early Warning System tackles Advanced Materials (AdMa) risk governance by providing a framework, organised in two tiers, underpinned with methods/tools to support risk assessors in the pre‐assessment preceding risk assessment. It allows for initial screening to identify AdMa with concerns considering exposure, hazards, sustainability and ...
Julia Prinz   +11 more
wiley   +1 more source

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) [PDF]

open access: green, 2009
Sergey Bratus   +3 more
openalex   +1 more source

Factors Driving Battery and Solar Purchase Decision of Residents: a Behavioural Choice Experiment Using a Hybrid Discrete Choice and Latent Variable Model

open access: yesAdvanced Sustainable Systems, EarlyView.
This article explores what drives households to adopt solar PV and battery systems in South East Queensland. Using hybrid discrete choice experiments, it reveals distinct adopter profiles and highlights cost, system size, and energy independence as key motivators.
Mohammad Alipour   +3 more
wiley   +1 more source

Trusted computing strengthens cloud authentication. [PDF]

open access: yesScientificWorldJournal, 2014
Ghazizadeh E   +3 more
europepmc   +1 more source

Mobile security and trusted computing

open access: yes, 2006
Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with
openaire   +11 more sources

Combined On-line and Off-line Trust Mechanism for Agent Computing [PDF]

open access: green, 2009
Babak Khosravifar   +3 more
openalex   +1 more source

Trustworthy Inverse Molecular Design via Alignment with Molecular Dynamics

open access: yesAdvanced Science, EarlyView.
Data‐driven inverse molecular design (IMD) is a promising approach to discovering new molecules with desired properties. Despite the remarkable progress, existing IMD methods lag behind in terms of trustworthiness, as indicated by their misalignment with the ground‐truth function that models the molecular dynamics.
Kevin Tirta Wijaya   +3 more
wiley   +1 more source

A mobile and portable trusted computing platform

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational ...
Nepal Surya   +3 more
doaj  

Home - About - Disclaimer - Privacy