Results 51 to 60 of about 135,847 (312)
Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem+2 more
core +2 more sources
Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj +2 more sources
Mitochondrial DNA disorders in neuromuscular diseases in diverse populations
Abstract Neuromuscular features are common in mitochondrial DNA (mtDNA) disorders. The genetic architecture of mtDNA disorders in diverse populations is poorly understood. We analysed mtDNA variants from whole‐exome sequencing data in neuromuscular patients from South Africa, Brazil, India, Turkey and Zambia. In 998 individuals, there were two definite
Fei Gao+34 more
wiley +1 more source
SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks
Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to
Po-Hung Yang, Sung-Ming Yen
doaj +1 more source
Bistable Mechanisms 3D Printing for Mechanically Programmable Vibration Control
This work introduces a 3D‐printed bistable mechanism integrated into tuned mass dampers (TMDs) for mechanically adaptive passive vibration suppression. Through optimized geometry, the bistable design provides adaptable vibration reduction across a broad range of scenarios, achieving effective vibration mitigation without complex controls or external ...
Ali Zolfagharian+4 more
wiley +1 more source
New extension method of trusted certificate chain in virtual platform environment
When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust ...
Liang TAN, Neng QI, Lingbi HU
doaj +2 more sources
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.+2 more
core +1 more source
Data centric trust evaluation and prediction framework for IOT [PDF]
© 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the
Jayasinghe, Upal+3 more
core +1 more source
Supramolecular Chemistry in Metal–Organic Framework Materials
This review highlights synergies between reticular chemistry and supramolecular chemistry. The role of supramolecular interactions in determining framework…guest interactions and attempts to understand dynamic behavior in metal–organic frameworks (MOFs), particularly emphasizing the development of crystal sponges, studying reactions in frameworks and ...
Eugenia Miguel‐Casañ+3 more
wiley +1 more source
Machine‐Learning‐Aided Advanced Electrochemical Biosensors
Electrochemical biosensors are highly sensitive, portable, and versatile. Advanced nanomaterials enhance their performance, while machine learning (ML) improves data analysis, minimizes interference, and optimizes sensor design. Despite progress in both fields, their combined potential in diagnostics remains underexplored.
Andrei Bocan+9 more
wiley +1 more source