Results 31 to 40 of about 124,809 (301)
Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road [PDF]
The advent of smartphones and the flexibility to have multiple applications serving the user's needs, has started a convergence of different services into a single device.
Akram, Raja Naeem +3 more
core +1 more source
TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain
With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As data recorded in EDRs began to be used as conclusive proof in courts, many researchers turned
Dongwoo Kang, Hyo Jin Jo
doaj +1 more source
Attestation Mechanisms for Trusted Execution Environments Demystified
Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains.
Jämes Ménétrey +6 more
openaire +2 more sources
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan +3 more
doaj +1 more source
ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated execution environment provides reliable assurance of secure storage of credentials in mobile devices.
Ziwang Wang, Liang Wang, Huili Yan
doaj +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
A Survey on Trusted Distributed Artificial Intelligence
Emerging Artificial Intelligence (AI) systems are revolutionizing computing and data processing approaches with their strong impact on society. Data is processed with automated labelling pipelines rather than providing it as input to the system.
Muhammed Akif AĞCA +2 more
doaj +1 more source
Fragmentation of confidential objects for data processing security in distributed systems [PDF]
This paper discusses how object orientation in application design enables confidentiality aspects to be handled more easily than in conventional approaches.
Fabre, Jean-Charles, Pérennou, Tanguy
core +1 more source
A blockchain-enabled wiki framework based on participatory design
The 5G mobile Internet facilitates contents generation for online communities and platforms through human-to-human collaboration. Wikipedia, a well-known online community, uses wiki technology to build an encyclopedia through collective intelligence and ...
Zheng Xu +4 more
doaj +1 more source
Trusted Operations on Sensor Data †
The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices.
Hassaan Janjua +3 more
doaj +1 more source

