Results 31 to 40 of about 115,293 (296)
HasTEE: Programming Trusted Execution Environments with Haskell
To appear in Haskell Symposium ...
Sarkar, Abhiroop+3 more
openaire +2 more sources
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced ...
Maxim EDOH+3 more
doaj +1 more source
A Survey on Trusted Distributed Artificial Intelligence
Emerging Artificial Intelligence (AI) systems are revolutionizing computing and data processing approaches with their strong impact on society. Data is processed with automated labelling pipelines rather than providing it as input to the system.
Muhammed Akif AĞCA+2 more
doaj +1 more source
SoK: Hardware-supported Trusted Execution Environments
The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast.
Schneider, Moritz; id_orcid0000-0002-8069-9848+4 more
openaire +3 more sources
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano+5 more
core +1 more source
Confidential execution of cloud services [PDF]
In this paper, we present Confidential Domain of Execution (CDE), a mechanism for achieving confidential execution of software in an otherwise untrusted environment, e.g., at a Cloud Service Provider.
Cherubini, Davide+2 more
core +1 more source
Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators [PDF]
. User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and ...
Akram, Raja Naeem+2 more
core +1 more source
TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain
With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As data recorded in EDRs began to be used as conclusive proof in courts, many researchers turned
Dongwoo Kang, Hyo Jin Jo
doaj +1 more source
Providing Trusted Execution Environments using FPGA
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the systems by providing a secure execution environment for security-critical applications that are isolated from the operating system or the hypervisor. TEEs are often assumed to be highly secure; however, over the last few years, TEEs have been proven weak ...
Pereira, Sérgio Augusto Gomes+3 more
openaire +3 more sources
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan+3 more
doaj +1 more source