Results 41 to 50 of about 124,809 (301)

Interoperable Blockchains for Highly-Integrated Supply Chains in Collaborative Manufacturing

open access: yesSensors, 2021
Blockchain technology plays a pivotal role in the undergoing fourth industrial revolution or Industry 4.0. It is considered a tremendous boost to company digitalization; thus, considerable investments in blockchain are being made.
Paolo Bellavista   +5 more
doaj   +1 more source

Initialization scheme of the trusted execution environment based on the user card

open access: yesDianxin kexue, 2017
Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust ...
Lei WANG, Meng LU
doaj   +2 more sources

DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V

open access: yesSensors, 2022
A Trusted Execution Environment (TEE) is an efficient way to secure information. To obtain higher efficiency, the building of a dual-core system-on-chip (SoC) with TEE security capabilities is the hottest topic.
Yuehai Chen   +6 more
doaj   +1 more source

Network-aware Evaluation Environment for Reputation Systems [PDF]

open access: yes, 2013
Parties of reputation systems rate each other and use ratings to compute reputation scores that drive their interactions. When deciding which reputation model to deploy in a network environment, it is important to find the most suitable model and to ...
A. Jøsang   +8 more
core   +1 more source

uTango: An Open-Source TEE for IoT Devices

open access: yesIEEE Access, 2022
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security mechanisms to separate security-critical applications from less ...
Daniel Oliveira   +2 more
doaj   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Research of a trusted execution environment module for multiple platforms

open access: yesTongxin xuebao, 2014
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG   +4 more
doaj   +2 more sources

On Making Emerging Trusted Execution Environments Accessible to Developers

open access: yes, 2015
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N.   +2 more
core   +1 more source

Screening for lung cancer: A systematic review of overdiagnosis and its implications

open access: yesMolecular Oncology, EarlyView.
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz   +12 more
wiley   +1 more source

Blockchain based resource governance for decentralized web environments

open access: yesFrontiers in Blockchain, 2023
Decentralization initiatives such as Solid, Digi.me, and ActivityPub aim to give data owners more control over their data and to level the playing field by enabling small companies and individuals to gain access to data, thus stimulating innovation ...
Davide Basile   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy