Results 41 to 50 of about 115,293 (296)
uTango: An Open-Source TEE for IoT Devices
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security mechanisms to separate security-critical applications from less ...
Daniel Oliveira+2 more
doaj +1 more source
Trusted Execution of Periodic Tasks for Embedded Systems [PDF]
Systems that interact with the environment around them generally run some periodic tasks. This class of systems include, among others, embedded control systems.
Gunnarsson, Martin+2 more
core
Trusted Execution Environments for Internet of Things Devices
A trusted execution Environment (TEE) could be a comfy place of a computer’s essential processor that's designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the
Abhilash Kayyidavazhiyil+1 more
openaire +2 more sources
Trusted Operations on Sensor Data †
The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices.
Hassaan Janjua+3 more
doaj +1 more source
Interoperable Blockchains for Highly-Integrated Supply Chains in Collaborative Manufacturing
Blockchain technology plays a pivotal role in the undergoing fourth industrial revolution or Industry 4.0. It is considered a tremendous boost to company digitalization; thus, considerable investments in blockchain are being made.
Paolo Bellavista+5 more
doaj +1 more source
Fragmentation of confidential objects for data processing security in distributed systems [PDF]
This paper discusses how object orientation in application design enables confidentiality aspects to be handled more easily than in conventional approaches.
Fabre, Jean-Charles, Pérennou, Tanguy
core +1 more source
A framework for application partitioning using trusted execution environments [PDF]
SummaryThe size and complexity of modern applications are the underlying causes of numerous security vulnerabilities. In order to mitigate the risks arising from such vulnerabilities, various techniques have been proposed to isolate the execution of sensitive code from the rest of the application and from other software on the platform (such as the ...
Atamli-Reineh, Ahmad+4 more
openaire +5 more sources
DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V
A Trusted Execution Environment (TEE) is an efficient way to secure information. To obtain higher efficiency, the building of a dual-core system-on-chip (SoC) with TEE security capabilities is the hottest topic.
Yuehai Chen+6 more
doaj +1 more source
Initialization scheme of the trusted execution environment based on the user card
Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust ...
Lei WANG, Meng LU
doaj +2 more sources
Blockchain based resource governance for decentralized web environments
Decentralization initiatives such as Solid, Digi.me, and ActivityPub aim to give data owners more control over their data and to level the playing field by enabling small companies and individuals to gain access to data, thus stimulating innovation ...
Davide Basile+3 more
doaj +1 more source