Results 31 to 40 of about 124,809 (301)

Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road [PDF]

open access: yes, 2017
The advent of smartphones and the flexibility to have multiple applications serving the user's needs, has started a convergence of different services into a single device.
Akram, Raja Naeem   +3 more
core   +1 more source

TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain

open access: yesIEEE Access, 2023
With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As data recorded in EDRs began to be used as conclusive proof in courts, many researchers turned
Dongwoo Kang, Hyo Jin Jo
doaj   +1 more source

Attestation Mechanisms for Trusted Execution Environments Demystified

open access: yes, 2022
Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains.
Jämes Ménétrey   +6 more
openaire   +2 more sources

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments

open access: yesIEEE Access, 2023
ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated execution environment provides reliable assurance of secure storage of credentials in mobile devices.
Ziwang Wang, Liang Wang, Huili Yan
doaj   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

A Survey on Trusted Distributed Artificial Intelligence

open access: yesIEEE Access, 2022
Emerging Artificial Intelligence (AI) systems are revolutionizing computing and data processing approaches with their strong impact on society. Data is processed with automated labelling pipelines rather than providing it as input to the system.
Muhammed Akif AĞCA   +2 more
doaj   +1 more source

Fragmentation of confidential objects for data processing security in distributed systems [PDF]

open access: yes, 1995
This paper discusses how object orientation in application design enables confidentiality aspects to be handled more easily than in conventional approaches.
Fabre, Jean-Charles, Pérennou, Tanguy
core   +1 more source

A blockchain-enabled wiki framework based on participatory design

open access: yesDigital Communications and Networks, 2022
The 5G mobile Internet facilitates contents generation for online communities and platforms through human-to-human collaboration. Wikipedia, a well-known online community, uses wiki technology to build an encyclopedia through collective intelligence and ...
Zheng Xu   +4 more
doaj   +1 more source

Trusted Operations on Sensor Data †

open access: yesSensors, 2018
The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices.
Hassaan Janjua   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy