Results 31 to 40 of about 135,847 (312)

Assessment of VLSI resources requirement for a sliced trusted platform module

open access: bronze, 2015
Recent increases in cybercrime suggest questions such as: How can one trust a secure system? How can one protect private information from being stolen and maintain security? Trust in any system requires a foundation or root of trust. A root of trust is necessary to establish confidence that a machine is clean and that a software execution environment ...
Hala Hamadeh
openalex   +4 more sources

Securing the distribution and storage of secrets with trusted platform modules [PDF]

open access: closed, 2007
We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users.
Paul E. Sevinç   +2 more
openalex   +2 more sources

CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments [PDF]

open access: bronzeAsia-Pacific Computer Systems Architecture Conference, 2022
Joana Pecholt, Sascha Wessel
openalex   +2 more sources

Blind signature scheme based on trusted platform computation module

open access: yesTongxin xuebao, 2013
For the key leak problem in identity-based blind signature, a blind signature scheme based on the trusted plat-form control module (TPCM) was presented.
Wen-ting HUANG   +2 more
doaj   +3 more sources

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM) [PDF]

open access: greenDETIPS/DeSECSys/MPS/SPOSE@ESORICS, 2020
Antonio Muñoz   +3 more
openalex   +2 more sources

A New Cloud Architecture of Virtual Trusted Platform Modules

open access: goldIEICE Transactions on Information and Systems, 2012
Dongxi Liu   +4 more
openalex   +4 more sources

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

The Method for creating a trusted hardware-software platform for its application in special purpose information systems

open access: yesБезопасность информационных технологий, 2021
The paper presents a method to increase trust levels of foreign and domestic-made hardware-software platforms, designed to build specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities ...
Alexey Y. Borovikov   +3 more
doaj   +1 more source

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes, 2013
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +4 more sources

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks

open access: yesIEEE Access, 2022
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy