Results 41 to 50 of about 152,709 (325)

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj   +3 more sources

Research of a trusted execution environment module for multiple platforms

open access: yesTongxin xuebao, 2014
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG   +4 more
doaj   +2 more sources

Confidential computing and related technologies: a critical review

open access: yesCybersecurity, 2023
This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC).
Muhammad Usama Sardar, Christof Fetzer
doaj   +1 more source

Autentisering ved bruk av TPM (Trusted Platform Module)

open access: gold, 2009
Prosjektet er gjennomført på oppdrag fra Buypass AS. Prosjektoppgaven har gått ut på å se på hvordan TPM brikken kan benyttes for brukerautentisering mot en sentral webbasert-tjeneste. Herunder, kartlegge TPM brikken og utvikle en demonstrator/prototype.
Håvelsrud, Per Øyvind   +1 more
openaire   +2 more sources

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation

open access: yesSensors, 2022
This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios.
Ernesto Gómez-Marín   +5 more
doaj   +1 more source

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]

open access: yes, 2008
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L.   +10 more
core   +4 more sources

Model checking of trusted cryptographic module

open access: yesTongxin xuebao, 2010
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj   +2 more sources

RAitc: Securely Auditing the Remotely Executed Applications

open access: yesIEEE Access, 2020
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users’ applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj   +1 more source

The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment

open access: yesSensors, 2023
The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually stems from
Janusz Furtak
doaj   +1 more source

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy