Results 241 to 250 of about 135,847 (312)
Trusted Platform Module for Smart Cards [PDF]
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card initiative. The initiative could effectively replace heavy wallets full of smart cards for mundane tasks. However, the issue of the deployment model still lingers on.
Raja Naeem Akram+2 more
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An Introduction to the Trusted Platform Module and Mobile Trusted Module
Secure Smart Embedded Devices, Platforms and Applications, 2014The trusted platform module (TPM) is a tamper-resistant component that provides roots of trust in secure computing and remote attestation frameworks. In this chapter, we briefly discuss the TPM architecture, operations and services. The discussion is then extended to the mobile trusted module (MTM)—to contrast and compare different approaches to ...
Raja Naeem Akram+2 more
semanticscholar +3 more sources
hTPM: Hybrid Implementation of Trusted Platform Module
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019Hardware-based TPM provides hardware-backed security solutions and a root of trust for various mission critical applications. However, hardware-based TPM has several intrinsic problems such as extremely low performance, off-chip security vulnerability ...
Yongjin Kim, Evan Kim
semanticscholar +2 more sources
Implementation of ECC-Based Trusted Platform Module
This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM.
Xing Zhang+3 more
openalex +3 more sources
Authentication of Trusted Platform Module Using Processor Response
International Symposium on Security in Computing and Communications, 2014Authentication is the process which allows both the communicating entities to validate each other. Authentication is the base for the trust between the two communicating party if both party wants to properly communicate. Trusted Platform Module (TPM) can be used to securely store artifacts like passwords, certificates, encryption keys or measurements ...
Vikash Kumar Rai, Arun Mishra
semanticscholar +3 more sources
Secure Bootstrapping Using the Trusted Platform Module
, 2018The protection of Computer Hardware and Software using Cryptographic algorithms has assumed importance in the recent years. The Trusted Computing Group (TCG) has put forward certain conditions to be met by the computer hardware, software and firmware so ...
K. Balasubramanian, A. Abbas
semanticscholar +2 more sources
A Survey on Trusted Platform Module for Data Remanence in Cloud
, 2016Cloud computing is the process of storing data in a common place rather than positioning the data in a computer or server. Though cloud computing offers various security features, various security issues has been in place. This paper aims to address one of the unidentified issue or inconsiderable issue in the cloud.
M. Fera, M. S. Priya
semanticscholar +3 more sources
Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking
2014 IEEE Computer Society Annual Symposium on VLSI, 2014Trusted Platform Module (TPM) has gained its popularity in computing systems as a hardware security approach. TPM provides the boot time security by verifying the platform integrity including hardware and software. However, once the software is loaded, TPM can no longer protect the software execution.
Sanjeev Das, Wei Zhang, Yang Liu
semanticscholar +3 more sources
Application Encryption with Trusted Platform Module to Implement Standards in Windows 11 Environment
IEEE International Conference on Photonics, 2023Trusted Platform Module (further TPM) was conceived as a low-cost chip that was first integrated into the processor and then became part of the motherboard. The controller works like a micro-computer.
Alina A. Zharkova
semanticscholar +1 more source