Results 21 to 30 of about 124,809 (301)

A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment

open access: yesMathematics, 2021
Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions.
Dong-Her Shih   +4 more
doaj   +1 more source

Secure Application Execution in Mobile Devices [PDF]

open access: yes, 2016
Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart ...
B Chevallier-Mames   +11 more
core   +1 more source

Providing Trusted Execution Environments using FPGA

open access: yes, 2022
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the systems by providing a secure execution environment for security-critical applications that are isolated from the operating system or the hypervisor. TEEs are often assumed to be highly secure; however, over the last few years, TEEs have been proven weak ...
Pereira, Sérgio Augusto Gomes   +3 more
openaire   +2 more sources

Transforming Byzantine Faults using a Trusted Execution Environment [PDF]

open access: yes, 2019
We present a general transformation of general omission resilient distributed algorithms into byzantine fault ones. The transformation uses the guarantees of integrity and confidentiality provided by a trusted execution environment to implement a ...
Debois, Søren   +3 more
core   +1 more source

Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement

open access: yesJournal of Computing Research and Innovation, 2023
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced ...
Maxim EDOH   +3 more
doaj   +1 more source

TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone

open access: yesIEEE Access, 2021
A trusted execution environment (TEE) is a new hardware security feature that is isolated from a normal OS (i.e., rich execution environment (REE)). The TEE enables us to run a critical process, but the behavior is invisible from the normal OS, which ...
Kuniyasu Suzaki   +3 more
doaj   +1 more source

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Confidential execution of cloud services [PDF]

open access: yes, 2014
In this paper, we present Confidential Domain of Execution (CDE), a mechanism for achieving confidential execution of software in an otherwise untrusted environment, e.g., at a Cloud Service Provider.
Cherubini, Davide   +2 more
core   +1 more source

Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators [PDF]

open access: yes, 2013
. User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and ...
Akram, Raja Naeem   +2 more
core   +1 more source

Research on Embedded Dual Operating System Architecture Based on Trusted Execution Environment [PDF]

open access: yesJisuanji gongcheng, 2019
To address the requirements of the embedded systems for functionality and real-time performance,this paper presents a dual operating system architecture.Based on the trusted execution environment provided by ARM TrustZone,the dual operating system ...
MENG Ziqi,ZHANG Qianying,SHI Zhiping,GUAN Yong
doaj   +1 more source

Home - About - Disclaimer - Privacy