Results 31 to 40 of about 115,293 (296)

HasTEE: Programming Trusted Execution Environments with Haskell

open access: yesProceedings of the 16th ACM SIGPLAN International Haskell Symposium, 2023
To appear in Haskell Symposium ...
Sarkar, Abhiroop   +3 more
openaire   +2 more sources

Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement

open access: yesJournal of Computing Research and Innovation, 2023
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced ...
Maxim EDOH   +3 more
doaj   +1 more source

A Survey on Trusted Distributed Artificial Intelligence

open access: yesIEEE Access, 2022
Emerging Artificial Intelligence (AI) systems are revolutionizing computing and data processing approaches with their strong impact on society. Data is processed with automated labelling pipelines rather than providing it as input to the system.
Muhammed Akif AĞCA   +2 more
doaj   +1 more source

SoK: Hardware-supported Trusted Execution Environments

open access: yes, 2022
The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast.
Schneider, Moritz; id_orcid0000-0002-8069-9848   +4 more
openaire   +3 more sources

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Confidential execution of cloud services [PDF]

open access: yes, 2014
In this paper, we present Confidential Domain of Execution (CDE), a mechanism for achieving confidential execution of software in an otherwise untrusted environment, e.g., at a Cloud Service Provider.
Cherubini, Davide   +2 more
core   +1 more source

Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators [PDF]

open access: yes, 2013
. User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and ...
Akram, Raja Naeem   +2 more
core   +1 more source

TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain

open access: yesIEEE Access, 2023
With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As data recorded in EDRs began to be used as conclusive proof in courts, many researchers turned
Dongwoo Kang, Hyo Jin Jo
doaj   +1 more source

Providing Trusted Execution Environments using FPGA

open access: yes, 2022
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the systems by providing a secure execution environment for security-critical applications that are isolated from the operating system or the hypervisor. TEEs are often assumed to be highly secure; however, over the last few years, TEEs have been proven weak ...
Pereira, Sérgio Augusto Gomes   +3 more
openaire   +3 more sources

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy