Results 51 to 60 of about 115,293 (296)
Research of a trusted execution environment module for multiple platforms
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG+4 more
doaj +2 more sources
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto+3 more
doaj +1 more source
Transparent code authentication at the processor level [PDF]
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim+32 more
core +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley+16 more
core +2 more sources
Objective Pediatric rheumatologic diseases (PRDs) are characterized by high rates of anxiety and depression known to impact health‐related outcomes. We present guidance statements to assess and manage mental health concerns for youth with PRDs in pediatric rheumatology practice.
Natoshia R. Cunningham+21 more
wiley +1 more source
A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments
Payment apps and digital wallets are powerful tools used to exchange e-money via the internet. However, with the progressive disappearance of cash, there is a need for the digital equivalent of physical banknotes to guarantee the same level of anonymity ...
Luca Mainetti+3 more
doaj +1 more source
Objective This study aimed to identify themes contributing to resilience in childhood‐onset systemic lupus erythematosus (cSLE), distinguish between profiles of resilience, and examine how they relate to underlying themes and patient characteristics. Methods We conducted a mixed‐methods study of 21 patients with cSLE aged 11 to 19 years at a Canadian ...
Isabella Zaffino+12 more
wiley +1 more source
Reinforcing SLA Consensus on Blockchain
Cloud Infrastructure as a Service (IaaS) Service Level Agreements (SLAs) assessment constitutes the de facto area of interest and applications in the public cloud infrastructure.
Nikolaos Kapsoulis+3 more
doaj +1 more source
Trusted execution: applications and verification [PDF]
Useful security properties arise from sealing data to specific units of code. Modern processors featuring Intel’s TXT and AMD’s SVM achieve this by a process of measured and trusted execution.
Batten, Ian Gilbert
core
Biopolymers are sustainable, biodegradable alternatives to petroleum‐based plastics for food packaging. Its adoption is often limited by poor mechanical strength, barrier properties, and improved thermal stability through the incorporation of nanofillers.
Himakshi Baishya+2 more
wiley +1 more source