Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Sami Alsouri+3 more
core +5 more sources
Software Emulation of Quantum Resistant Trusted Platform Modules [PDF]
Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives ...
Luís Fiolhais+2 more
+7 more sources
Emulating Trusted Platform Module 2.0 on Raspberry Pi 2 [PDF]
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets ...
Jen Liang Cheng+4 more
+6 more sources
Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective
Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private and sensitive data in the cloud brings multiple security issues and indeed these concerns currently prevent many ...
Devki Nandan Jha+4 more
openalex +3 more sources
Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module [PDF]
Behavioral traces of workers have emerged as a new evidence to check the quality of their produced outputs in crowd computing. Whether the evidence is trustworthy or not is a key problem during the process.
Donglai Fu, Yanhua Liu
openalex +2 more sources
Remote attestation on legacy operating systems with trusted platform modules [PDF]
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted
Dries Schellekens+2 more
+6 more sources
The creation of Qualified Signatures with Trusted Platform Modules [PDF]
Frederic Stumpf, Markus Sacher, Claudia Eckert and Alexander Roßnagel argue that the new generations of computers that include a trusted platform have the capacity of providing more reliable proof for both parties when entering contracts at a distance over the internet.
Frederic Stumpf+3 more
openalex +3 more sources
Securing Peer-to-Peer Distributions with Trusted Platform Modules [PDF]
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution.
Hao Li+3 more
openalex +3 more sources
The research of the side-channel analysis method based on deep learning for trusted platform module
At present, the trusted platform module (TPM) has been widely used in electricity, finance, transportation, and other industries, and its security has attracted much attention.
Zhe Wang+5 more
openalex +2 more sources
A Trusted Computing Architecture of Embedded System Based on Improved TPM [PDF]
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for ...
Wang Xiaosheng+3 more
doaj +2 more sources