Results 271 to 280 of about 135,847 (312)
Some of the next articles are maybe not open access.

Erzeugung elektronischer Signaturen mittels Trusted Platform Module

Datenschutz und Datensicherheit - DuD, 2007
Das durch die Trusted Computing Group spezifizierte Trusted Platform Module (TPM) bietet ahnliche Funktionen wie eine Smartcard. Der Beitrag untersucht, unter welchen Voraussetzungen das TPM fur die Erzeugung von qualifizierten elektronischen Signaturen geeignet ist.
Frederic Stumpf   +3 more
openaire   +2 more sources

Expand the SSL/TLS protocol on Trusted Platform Module

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
In this paper, we discuss security issues of the current SSL/TLS protocol and pay attention to the security vulnerabilities of the expansion of SSL/TLS protocol based on the TPM (Trusted Platform Module). We experiment on one attacking technique that can damage the security of SSL/TLS protocol successfully.
Yue Yu, Hao Sun, Yanan Kong
openaire   +2 more sources

Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module

2012 IEEE/ACIS 11th International Conference on Computer and Information Science, 2012
this paper proposes a kind of hardware layer trusted channel model based on the trusted platform control module. Through being embedded into hardware equipment, measurement agent as well as control one constructs trusted computer system with hardware layer trusted channel model.
Jiang Wei   +7 more
openaire   +2 more sources

Secure Web Browsing Using Trusted Platform Module (TPM)

2020
According to the Internet usage statistics published on June 2019, around 59% of the world’s human population uses the Internet. The web browser is one of the most used applications to access the Internet. How many of these 59% population trust the browser and the environment they are using?
Harshad Suryakant Wadkar, Arun Mishra
openaire   +2 more sources

Strengthening enterprise applications using trusted platform modules

Network Security, 2008
Although millions of laptops and desktops are shipped with Trusted Platform Module chips, the corporate IT buyer has only recently become aware of TPM's existence and its strong cryptographic features. TPM allows enterprises to harden their enterprise applications through email and document signing, data confidentiality protection, VPN infrastructure ...
openaire   +2 more sources

FADETPM: Novel approach of file assured deletion based on trusted platform module

International Conference on Cloud Computing Technologies and Applications, 2017
Igarramen Zakaria, Hedabou Mustaha
semanticscholar   +2 more sources

Using Trusted Platform Modules for Location Assurance in Cloud Networking

2013
In cloud networking users may want to control where their virtual resources are stored or processed, e.g., only in western Europe and not in the US. Cloud networking is the combined management of cloud computing and network infrastructures of different providers and enables dynamic and flexible placement of virtual resources in this distributed ...
Volker Fusenig, Christoph Krauß
openaire   +2 more sources

Platform ecosystems as meta‐organizations: Implications for platform strategies

Strategic Management Journal, 2022
Aija Leiponen   +2 more
exaly  

Home - About - Disclaimer - Privacy