Assessment of VLSI resources requirement for a sliced trusted platform module
Recent increases in cybercrime suggest questions such as: How can one trust a secure system? How can one protect private information from being stolen and maintain security? Trust in any system requires a foundation or root of trust. A root of trust is necessary to establish confidence that a machine is clean and that a software execution environment ...
Hala Hamadeh
openalex +4 more sources
Securing the distribution and storage of secrets with trusted platform modules [PDF]
We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users.
Paul E. Sevinç+2 more
openalex +2 more sources
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments [PDF]
Joana Pecholt, Sascha Wessel
openalex +2 more sources
Blind signature scheme based on trusted platform computation module
For the key leak problem in identity-based blind signature, a blind signature scheme based on the trusted plat-form control module (TPCM) was presented.
Wen-ting HUANG+2 more
doaj +3 more sources
ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM) [PDF]
Antonio Muñoz+3 more
openalex +2 more sources
A New Cloud Architecture of Virtual Trusted Platform Modules
Dongxi Liu+4 more
openalex +4 more sources
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan+3 more
doaj +1 more source
The paper presents a method to increase trust levels of foreign and domestic-made hardware-software platforms, designed to build specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities ...
Alexey Y. Borovikov+3 more
doaj +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar+3 more
core +4 more sources
Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez+5 more
doaj +1 more source