Results 21 to 30 of about 115,293 (296)
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun+2 more
doaj +1 more source
SofTEE: Software-Based Trusted Execution Environment for User Applications
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj +1 more source
Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling.
Nan Yang+5 more
doaj +1 more source
Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment
The traditional centralized power trading model suffers from high maintenance costs, low processing efficiency and unsynchronized information, and it cannot adapt to the high-frequency and small-dollar distributed energy trading scenario.
Xin Lu, Hongchen Guo
doaj +1 more source
The relevance of the present study is confirmed by the need for implementing technologies of program code, controlled execution for general-purpose systems and for systems, which are used in critical information infrastructure (CII).
Aleksandr G. Burtsev+2 more
doaj +1 more source
Quick Boot of Trusted Execution Environment With Hardware Accelerators
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.
Trong-Thuc Hoang+6 more
doaj +1 more source
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the Root-of-Trust (RoT). However, the RoT implementation often relies on obscurity and provides little
Trong-Thuc Hoang+7 more
doaj +1 more source
Attestation Mechanisms for Trusted Execution Environments Demystified
Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains.
Jämes Ménétrey+6 more
openaire +2 more sources
Trusted Execution Environment: What It is, and What It is Not [PDF]
Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system.
Abdelmadjid Bouabdallah+2 more
openaire +1 more source
A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment
Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions.
Dong-Her Shih+4 more
doaj +1 more source