Results 21 to 30 of about 124,809 (301)
A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment
Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions.
Dong-Her Shih +4 more
doaj +1 more source
Secure Application Execution in Mobile Devices [PDF]
Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart ...
B Chevallier-Mames +11 more
core +1 more source
Providing Trusted Execution Environments using FPGA
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the systems by providing a secure execution environment for security-critical applications that are isolated from the operating system or the hypervisor. TEEs are often assumed to be highly secure; however, over the last few years, TEEs have been proven weak ...
Pereira, Sérgio Augusto Gomes +3 more
openaire +2 more sources
Transforming Byzantine Faults using a Trusted Execution Environment [PDF]
We present a general transformation of general omission resilient distributed algorithms into byzantine fault ones. The transformation uses the guarantees of integrity and confidentiality provided by a trusted execution environment to implement a ...
Debois, Søren +3 more
core +1 more source
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced ...
Maxim EDOH +3 more
doaj +1 more source
A trusted execution environment (TEE) is a new hardware security feature that is isolated from a normal OS (i.e., rich execution environment (REE)). The TEE enables us to run a critical process, but the behavior is invisible from the normal OS, which ...
Kuniyasu Suzaki +3 more
doaj +1 more source
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
Confidential execution of cloud services [PDF]
In this paper, we present Confidential Domain of Execution (CDE), a mechanism for achieving confidential execution of software in an otherwise untrusted environment, e.g., at a Cloud Service Provider.
Cherubini, Davide +2 more
core +1 more source
Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators [PDF]
. User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and ...
Akram, Raja Naeem +2 more
core +1 more source
Research on Embedded Dual Operating System Architecture Based on Trusted Execution Environment [PDF]
To address the requirements of the embedded systems for functionality and real-time performance,this paper presents a dual operating system architecture.Based on the trusted execution environment provided by ARM TrustZone,the dual operating system ...
MENG Ziqi,ZHANG Qianying,SHI Zhiping,GUAN Yong
doaj +1 more source

