Results 241 to 250 of about 135,847 (312)

Trusted Platform Module for Smart Cards [PDF]

open access: yes2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card initiative. The initiative could effectively replace heavy wallets full of smart cards for mundane tasks. However, the issue of the deployment model still lingers on.
Raja Naeem Akram   +2 more
semanticscholar   +4 more sources

An Introduction to the Trusted Platform Module and Mobile Trusted Module

Secure Smart Embedded Devices, Platforms and Applications, 2014
The trusted platform module (TPM) is a tamper-resistant component that provides roots of trust in secure computing and remote attestation frameworks. In this chapter, we briefly discuss the TPM architecture, operations and services. The discussion is then extended to the mobile trusted module (MTM)—to contrast and compare different approaches to ...
Raja Naeem Akram   +2 more
semanticscholar   +3 more sources

hTPM: Hybrid Implementation of Trusted Platform Module

Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
Hardware-based TPM provides hardware-backed security solutions and a root of trust for various mission critical applications. However, hardware-based TPM has several intrinsic problems such as extremely low performance, off-chip security vulnerability ...
Yongjin Kim, Evan Kim
semanticscholar   +2 more sources

Implementation of ECC-Based Trusted Platform Module

open access: closed2007 International Conference on Machine Learning and Cybernetics, 2007
This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM.
Xing Zhang   +3 more
openalex   +3 more sources

Authentication of Trusted Platform Module Using Processor Response

International Symposium on Security in Computing and Communications, 2014
Authentication is the process which allows both the communicating entities to validate each other. Authentication is the base for the trust between the two communicating party if both party wants to properly communicate. Trusted Platform Module (TPM) can be used to securely store artifacts like passwords, certificates, encryption keys or measurements ...
Vikash Kumar Rai, Arun Mishra
semanticscholar   +3 more sources

Secure Bootstrapping Using the Trusted Platform Module

, 2018
The protection of Computer Hardware and Software using Cryptographic algorithms has assumed importance in the recent years. The Trusted Computing Group (TCG) has put forward certain conditions to be met by the computer hardware, software and firmware so ...
K. Balasubramanian, A. Abbas
semanticscholar   +2 more sources

A Survey on Trusted Platform Module for Data Remanence in Cloud

, 2016
Cloud computing is the process of storing data in a common place rather than positioning the data in a computer or server. Though cloud computing offers various security features, various security issues has been in place. This paper aims to address one of the unidentified issue or inconsiderable issue in the cloud.
M. Fera, M. S. Priya
semanticscholar   +3 more sources

Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking

2014 IEEE Computer Society Annual Symposium on VLSI, 2014
Trusted Platform Module (TPM) has gained its popularity in computing systems as a hardware security approach. TPM provides the boot time security by verifying the platform integrity including hardware and software. However, once the software is loaded, TPM can no longer protect the software execution.
Sanjeev Das, Wei Zhang, Yang Liu
semanticscholar   +3 more sources

Application Encryption with Trusted Platform Module to Implement Standards in Windows 11 Environment

IEEE International Conference on Photonics, 2023
Trusted Platform Module (further TPM) was conceived as a low-cost chip that was first integrated into the processor and then became part of the motherboard. The controller works like a micro-computer.
Alina A. Zharkova
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy