Results 41 to 50 of about 152,709 (325)
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Research of a trusted execution environment module for multiple platforms
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG +4 more
doaj +2 more sources
Confidential computing and related technologies: a critical review
This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC).
Muhammad Usama Sardar, Christof Fetzer
doaj +1 more source
Autentisering ved bruk av TPM (Trusted Platform Module)
Prosjektet er gjennomført på oppdrag fra Buypass AS. Prosjektoppgaven har gått ut på å se på hvordan TPM brikken kan benyttes for brukerautentisering mot en sentral webbasert-tjeneste. Herunder, kartlegge TPM brikken og utvikle en demonstrator/prototype.
Håvelsrud, Per Øyvind +1 more
openaire +2 more sources
RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation
This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios.
Ernesto Gómez-Marín +5 more
doaj +1 more source
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L. +10 more
core +4 more sources
Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj +2 more sources
RAitc: Securely Auditing the Remotely Executed Applications
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users’ applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj +1 more source
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually stems from
Janusz Furtak
doaj +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source

