Results 281 to 290 of about 152,709 (325)
Some of the next articles are maybe not open access.

Implementation of ECC-Based Trusted Platform Module

2007 International Conference on Machine Learning and Cybernetics, 2007
This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM.
Xing Zhang   +3 more
openaire   +1 more source

Erzeugung elektronischer Signaturen mittels Trusted Platform Module

Datenschutz und Datensicherheit - DuD, 2007
Das durch die Trusted Computing Group spezifizierte Trusted Platform Module (TPM) bietet ahnliche Funktionen wie eine Smartcard. Der Beitrag untersucht, unter welchen Voraussetzungen das TPM fur die Erzeugung von qualifizierten elektronischen Signaturen geeignet ist.
Frederic Stumpf   +3 more
openaire   +1 more source

Utilizing trusted platform module to mitigate botnet attacks

2010 International Conference on Computer Applications and Industrial Electronics, 2010
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing money or misuse of their accounts unknowingly. Well designed malwares are written to attack internet banking websites and its customers.
Muththolib Sidheeq   +2 more
openaire   +2 more sources

Firmware of Trusted Channel Based on the Trusted Platform Control Module

2013 6th International Conference on Intelligent Networks and Intelligent Systems, 2013
Untrusted hardware environment of computer system can give rise to untrusted software system. This paper puts forwards a trusted channel model and firmware based on trusted platform control module. This model constructs a kind of trusted channel between trusted platform control module and hardware device through trusted micro command to put down hidden
Mao Junjie   +7 more
openaire   +1 more source

A Cloud Architecture of Virtual Trusted Platform Modules

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms.
Dongxi Liu   +4 more
openaire   +1 more source

A Trusted Platform Module for Near Field Communication

2010 Fifth International Conference on Systems and Networks Communications, 2010
Near Field Communication (NFC) has become widely available on smart phones. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust.
Michael Hutter, Ronald Toegl
openaire   +1 more source

A Software-Based Trusted Platform Module Emulator

2008
When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix.
Mario Strasser, Heiko Stamer
openaire   +1 more source

Using trusted platform module to mitigate SSL stripping

2013 IEEE Conference on Open Systems (ICOS), 2013
Electronic commerce refers to trading of services or products over electronic systems such as the Internet and other computer networks. Internet banking, electronic data interchange, and inventory management systems are some examples of popular electronic commerce applications.
Fazli Mat Nor   +3 more
openaire   +1 more source

Strengthening enterprise applications using trusted platform modules

Network Security, 2008
Although millions of laptops and desktops are shipped with Trusted Platform Module chips, the corporate IT buyer has only recently become aware of TPM's existence and its strong cryptographic features. TPM allows enterprises to harden their enterprise applications through email and document signing, data confidentiality protection, VPN infrastructure ...
openaire   +1 more source

Secure Web Browsing Using Trusted Platform Module (TPM)

2020
According to the Internet usage statistics published on June 2019, around 59% of the world’s human population uses the Internet. The web browser is one of the most used applications to access the Internet. How many of these 59% population trust the browser and the environment they are using?
Harshad S. Wadkar, Arun Mishra
openaire   +1 more source

Home - About - Disclaimer - Privacy