Results 271 to 280 of about 135,847 (312)
Some of the next articles are maybe not open access.
Erzeugung elektronischer Signaturen mittels Trusted Platform Module
Datenschutz und Datensicherheit - DuD, 2007Das durch die Trusted Computing Group spezifizierte Trusted Platform Module (TPM) bietet ahnliche Funktionen wie eine Smartcard. Der Beitrag untersucht, unter welchen Voraussetzungen das TPM fur die Erzeugung von qualifizierten elektronischen Signaturen geeignet ist.
Frederic Stumpf+3 more
openaire +2 more sources
Expand the SSL/TLS protocol on Trusted Platform Module
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010In this paper, we discuss security issues of the current SSL/TLS protocol and pay attention to the security vulnerabilities of the expansion of SSL/TLS protocol based on the TPM (Trusted Platform Module). We experiment on one attacking technique that can damage the security of SSL/TLS protocol successfully.
Yue Yu, Hao Sun, Yanan Kong
openaire +2 more sources
Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module
2012 IEEE/ACIS 11th International Conference on Computer and Information Science, 2012this paper proposes a kind of hardware layer trusted channel model based on the trusted platform control module. Through being embedded into hardware equipment, measurement agent as well as control one constructs trusted computer system with hardware layer trusted channel model.
Jiang Wei+7 more
openaire +2 more sources
Secure Web Browsing Using Trusted Platform Module (TPM)
2020According to the Internet usage statistics published on June 2019, around 59% of the world’s human population uses the Internet. The web browser is one of the most used applications to access the Internet. How many of these 59% population trust the browser and the environment they are using?
Harshad Suryakant Wadkar, Arun Mishra
openaire +2 more sources
Strengthening enterprise applications using trusted platform modules
Network Security, 2008Although millions of laptops and desktops are shipped with Trusted Platform Module chips, the corporate IT buyer has only recently become aware of TPM's existence and its strong cryptographic features. TPM allows enterprises to harden their enterprise applications through email and document signing, data confidentiality protection, VPN infrastructure ...
openaire +2 more sources
FADETPM: Novel approach of file assured deletion based on trusted platform module
International Conference on Cloud Computing Technologies and Applications, 2017Igarramen Zakaria, Hedabou Mustaha
semanticscholar +2 more sources
Using Trusted Platform Modules for Location Assurance in Cloud Networking
2013In cloud networking users may want to control where their virtual resources are stored or processed, e.g., only in western Europe and not in the US. Cloud networking is the combined management of cloud computing and network infrastructures of different providers and enables dynamic and flexible placement of virtual resources in this distributed ...
Volker Fusenig, Christoph Krauß
openaire +2 more sources
Platform ecosystems as meta‐organizations: Implications for platform strategies
Strategic Management Journal, 2022Aija Leiponen+2 more
exaly
The Formal Analysis and Testing of Trusted Platform Module
Chinese Journal of Computers, 2009openaire +2 more sources
Journal of Signal Processing Systems, 2016
Zhilou Yu, Weipin Zhang, Hongjun Dai
semanticscholar +1 more source
Zhilou Yu, Weipin Zhang, Hongjun Dai
semanticscholar +1 more source