Results 11 to 20 of about 152,709 (325)
Trusted Platform Module for Smart Cards [PDF]
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card initiative. The initiative could effectively replace heavy wallets full of smart cards for mundane tasks. However, the issue of the deployment model still lingers on.
Raja Naeem Akram +2 more
semanticscholar +3 more sources
Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security [PDF]
Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic ...
Guobin Xu +4 more
doaj +3 more sources
Using Trusted Platform Module (TPM) to Secure Business [PDF]
Safety of human life during journey is one of most important objective of intelligent transportation system (ITS). Potential safety and non -safety applications of vehicular ad hoc network (VANET) also provides safety of human lives and also comfort ...
Halabi Hasbullah, Irshad Sumra
semanticscholar +3 more sources
Hardware-based Security for Virtual Trusted Platform Modules [PDF]
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Alsouri, Sami +3 more
core +4 more sources
A Brief Reflection on Trusted Platform Module Support
: Trusted Computing and its Trusted Platform Module were introduced about 20 years ago. However, their impact is still limited, only a small number of applications use a TPM, only a few people know that their computer hosts one and what it can be used ...
Martin Pirker, Robert Haas
semanticscholar +3 more sources
The research of the side-channel analysis method based on deep learning for trusted platform module
At present, the trusted platform module (TPM) has been widely used in electricity, finance, transportation, and other industries, and its security has attracted much attention.
Zhe Wang +5 more
openalex +2 more sources
Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module [PDF]
Behavioral traces of workers have emerged as a new evidence to check the quality of their produced outputs in crowd computing. Whether the evidence is trustworthy or not is a key problem during the process.
Donglai Fu, Yanhua Liu
openalex +2 more sources
Emulating Trusted Platform Module 2.0 on Raspberry Pi 2
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets ...
Jen-Liang Cheng +4 more
+5 more sources
Software Emulation of Quantum Resistant Trusted Platform Modules [PDF]
Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives ...
Fiolhais, L., Martins, P., Sousa, L.
openaire +3 more sources
Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface [PDF]
IoT devices typically have limited memory resources and computing power. For this reason, it is often not possible to use the authentication and trusted environment mechanisms commonly used on the Internet. Due to the autonomous operation of IoT devices,
Sebastian Łeska, Janusz Furtak
doaj +2 more sources

