Results 11 to 20 of about 152,709 (325)

Trusted Platform Module for Smart Cards [PDF]

open access: yes2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card initiative. The initiative could effectively replace heavy wallets full of smart cards for mundane tasks. However, the issue of the deployment model still lingers on.
Raja Naeem Akram   +2 more
semanticscholar   +3 more sources

Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security [PDF]

open access: goldFuture Internet
Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic ...
Guobin Xu   +4 more
doaj   +3 more sources

Using Trusted Platform Module (TPM) to Secure Business [PDF]

open access: goldProceedings of the 2015 International Conference on Recent Advances in Computer Systems, 2016
Safety of human life during journey is one of most important objective of intelligent transportation system (ITS). Potential safety and non -safety applications of vehicular ad hoc network (VANET) also provides safety of human lives and also comfort ...
Halabi Hasbullah, Irshad Sumra
semanticscholar   +3 more sources

Hardware-based Security for Virtual Trusted Platform Modules [PDF]

open access: green, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Alsouri, Sami   +3 more
core   +4 more sources

A Brief Reflection on Trusted Platform Module Support

open access: goldProceedings of the 10th International Conference on Information Systems Security and Privacy
: Trusted Computing and its Trusted Platform Module were introduced about 20 years ago. However, their impact is still limited, only a small number of applications use a TPM, only a few people know that their computer hosts one and what it can be used ...
Martin Pirker, Robert Haas
semanticscholar   +3 more sources

The research of the side-channel analysis method based on deep learning for trusted platform module

open access: diamondJournal of Physics: Conference Series, 2022
At present, the trusted platform module (TPM) has been widely used in electricity, finance, transportation, and other industries, and its security has attracted much attention.
Zhe Wang   +5 more
openalex   +2 more sources

Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module [PDF]

open access: hybridSecur. Commun. Networks, 2021
Behavioral traces of workers have emerged as a new evidence to check the quality of their produced outputs in crowd computing. Whether the evidence is trustworthy or not is a key problem during the process.
Donglai Fu, Yanhua Liu
openalex   +2 more sources

Emulating Trusted Platform Module 2.0 on Raspberry Pi 2

open access: diamondInternational Journal of Security, Privacy and Trust Management, 2020
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets ...
Jen-Liang Cheng   +4 more
  +5 more sources

Software Emulation of Quantum Resistant Trusted Platform Modules [PDF]

open access: goldProceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives ...
Fiolhais, L., Martins, P., Sousa, L.
openaire   +3 more sources

Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface [PDF]

open access: yesSensors
IoT devices typically have limited memory resources and computing power. For this reason, it is often not possible to use the authentication and trusted environment mechanisms commonly used on the Internet. Due to the autonomous operation of IoT devices,
Sebastian Łeska, Janusz Furtak
doaj   +2 more sources

Home - About - Disclaimer - Privacy