Results 11 to 20 of about 135,847 (312)

Hardware-based Security for Virtual Trusted Platform Modules

open access: green, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Sami Alsouri   +3 more
core   +5 more sources

Software Emulation of Quantum Resistant Trusted Platform Modules [PDF]

open access: greenProceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives ...
Luís Fiolhais   +2 more
  +7 more sources

Emulating Trusted Platform Module 2.0 on Raspberry Pi 2 [PDF]

open access: goldInternational Journal of Security, Privacy and Trust Management, 2020
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets ...
Jen Liang Cheng   +4 more
  +6 more sources

Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective

open access: greenIT Professional, 2022
Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private and sensitive data in the cloud brings multiple security issues and indeed these concerns currently prevent many ...
Devki Nandan Jha   +4 more
openalex   +3 more sources

Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module [PDF]

open access: goldSecur. Commun. Networks, 2021
Behavioral traces of workers have emerged as a new evidence to check the quality of their produced outputs in crowd computing. Whether the evidence is trustworthy or not is a key problem during the process.
Donglai Fu, Yanhua Liu
openalex   +2 more sources

Remote attestation on legacy operating systems with trusted platform modules [PDF]

open access: bronzeElectronic Notes in Theoretical Computer Science, 2008
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted
Dries Schellekens   +2 more
  +6 more sources

The creation of Qualified Signatures with Trusted Platform Modules [PDF]

open access: hybridDigital Evidence and Electronic Signature Law Review, 2014
Frederic Stumpf, Markus Sacher, Claudia Eckert and Alexander Roßnagel argue that the new generations of computers that include a trusted platform have the capacity of providing more reliable proof for both parties when entering contracts at a distance over the internet.
Frederic Stumpf   +3 more
openalex   +3 more sources

Securing Peer-to-Peer Distributions with Trusted Platform Modules [PDF]

open access: bronzeInternational Journal of Wireless and Microwave Technologies, 2012
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution.
Hao Li   +3 more
openalex   +3 more sources

The research of the side-channel analysis method based on deep learning for trusted platform module

open access: goldJournal of Physics: Conference Series, 2022
At present, the trusted platform module (TPM) has been widely used in electricity, finance, transportation, and other industries, and its security has attracted much attention.
Zhe Wang   +5 more
openalex   +2 more sources

A Trusted Computing Architecture of Embedded System Based on Improved TPM [PDF]

open access: yesMATEC Web of Conferences, 2017
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for ...
Wang Xiaosheng   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy