Results 281 to 290 of about 124,809 (301)
Some of the next articles are maybe not open access.

Hardware-assisted Trusted Execution Environments

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Over the last two decades, hardware-based isolated execution environments, commonly known as "trusted execution environments" or TEEs, have become widely deployed [1,2,3,4]. However, concerns about vulnerabilities (like the Foreshadow attacks [5]), and potential for abuse have been persistent and have recently become increasingly pronounced.
openaire   +1 more source

Trusted execution environments on mobile devices

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013
A trusted execution environment (TEE) is a secure processing environment that is isolated from the normal processing environment where the device operating system and applications run. The first mobile phones with hardware-based TEEs appeared almost a decade ago, and today almost every smartphone and tablet contains a TEE like ARM TrustZone.
Ekberg, Jan-Erik   +3 more
openaire   +3 more sources

Awesome Trusted Execution Environment

2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2023
Luigi Coppolino   +2 more
openaire   +1 more source

Key Attestation from Trusted Execution Environments

2010
Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE.
Kari Kostiainen   +4 more
openaire   +1 more source

Credential Disabling from Trusted Execution Environments

2012
A generic credential platform realized using a hardware- based trusted execution environment (TrEE) provides a usable and inexpensive way to secure various applications and services. An important requirement for any credential platform is the ability to disable and restore credentials.
Kari Kostiainen   +2 more
openaire   +1 more source

Trusted execution environment-based authentication gauge (TEEBAG)

Proceedings of the 2016 New Security Paradigms Workshop, 2016
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing the location of authentication from a remote device (e.g. remote authentication server) to user device(s) that are TEE enabled. The authentication takes place locally on the user device and only the outcome is sent back to the remote device.
Balisane, R, Martin, A
openaire   +2 more sources

Trusted Execution Environments in Vehicles

ATZelektronik worldwide, 2016
Jens Köhler, Henry Förster
openaire   +1 more source

Trusted Execution Environments im Fahrzeug

ATZelektronik, 2016
Jens Köhler, Henry Förster
openaire   +1 more source

A Quantum Computer Trusted Execution Environment

2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2023
Theodoros Trochatos   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy