Results 271 to 280 of about 152,709 (325)
Some of the next articles are maybe not open access.
Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle
ICC 2022 - IEEE International Conference on Communications, 2022With the development of Internet of Things (IoT) technology, the digital pill has been employed as an IoT system for emerging remote health monitoring to detect the impact of medicine intake on patients’ biological index.
Mingyuan Huang +4 more
semanticscholar +1 more source
xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices
IEEE Journal on Selected Areas in Communications, 2021IoT based eHealth system brings a revolution to healthcare industry, with which the old healthcare systems can be updated into smarter and more personalized ones.
D. Lu +6 more
semanticscholar +1 more source
Macros for Coding Information Encryption & Decryption in Trusted Platform Module
2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), 2020This article describes the process assembling of Encryption & Decryption In Trusted Platform Module of encoding information in NM640X ®. Encoding of information, carried out in assembly language according to Gost 28147–89. It is a realisation of standard
V. Ruchkin +4 more
semanticscholar +1 more source
Personal Trusted Platform Module for the Multi-Core System of 5G Security and Privacy
2020 ELEKTRO, 2020The article is devoted to the choice of personal means of the 5G defense in dependence of hard- and software available to the user. The universal module MS 127.04 and its software compatible unit can be universally configured for use.
V. Ruchkin +4 more
semanticscholar +1 more source
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing
IEEE Transactions on Cloud Computing, 2023Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms (e.g., VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and security services for virtual machines.
Juan Wang +8 more
semanticscholar +1 more source
Data protection utilizing trusted platform module
Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing - CompSysTech '08, 2008Data protection has become a major requirement for computer systems which process sensitive information especially in daily commercial activities. It is mainly achieved through encryption based on software protections measures that have constantly shown lacks of security against attacks or malicious codes.
Elior Vila, Plamenka Borovska
openaire +1 more source
Integrating Trusted Platform Modules in Power Electronics
2020 IEEE CyberPELS (CyberPELS), 2020Trusted Platform Modules (TPMs) are specialized chips that store RSA keys specific to the host system for hardware authentication. The RSA keys refer to an encryption technology developed by RSA Data Security. The RSA algorithm accounts for the fact that there is no efficient way to factor extremely large numbers. Each TPM chip contains an RSA Key pair
Ammar Khan +3 more
openaire +1 more source
hTPM: Hybrid Implementation of Trusted Platform Module
CYSARM@CCS, 2019Hardware-based TPM provides hardware-backed security solutions and a root of trust for various mission critical applications. However, hardware-based TPM has several intrinsic problems such as extremely low performance, off-chip security vulnerability ...
Yongjin Kim, Evan Kim
semanticscholar +1 more source
Frameworks Built on the Trusted Platform Module
30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006We discuss two secure operating system frameworks built upon the Trusted Computing Group?s Trusted Platform Module intended to assure remote execution. The security implications of the respective design decisions are discussed, as well as highlighting vulnerabilities in protocol and system design.
Matt Barrett, Clark Thomborson
openaire +1 more source
Feasibility study of dynamic Trusted Platform Module
2010 IEEE International Conference on Computer Design, 2010A Trusted Platform Module (TPM) authenticates general purpose computing platforms. This is done by taking platform integrity measurement and comparing it with a precomputed value at boot-time. Existing TPM architectures do not support run-time integrity checking of a program on the platform.
Arun K. Kanuparthi +2 more
openaire +1 more source

