Results 61 to 70 of about 135,847 (312)
VMI-based virtual machine remote attestation scheme
The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo ...
Wei WANG,Xin JIN, Xingshu CHEN, Xiao LAN
doaj +3 more sources
Access mechanism of TMP under mobile network
The publication of TCG MTM standard ensured the safety of mobile terminal and its promotion results in the changes of communication on mobile terminals.An access mechanism to trusted mobile platform(mobile terminals with MTM chips,TMP) was proposed on ...
WU Zhen-qiang, ZHOU Yan-wei, QIAO Zi-rui
doaj +2 more sources
A Framework for Constructing a Secure Domain of Sensor Nodes
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its ...
Janusz Furtak+2 more
doaj +1 more source
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
This work reveals that charge transport in nickel benzenehexathiol coordination nanosheets is governed by variable‐range hopping reflecting structural disorder. Electrolyte gating induces a switch in dominant carrier polarity from p‐type to n‐type and leads to an improvement in thermoelectric performance.
Tian Wu+8 more
wiley +1 more source
A mobile and portable trusted computing platform
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational ...
Nepal Surya+3 more
doaj
A Shibboleth-protected privilege management infrastructure for e-science education [PDF]
Simplifying access to and usage of large scale compute resources via the grid is of critical importance to encourage the uptake of e-research. Security is one aspect that needs to be made as simple as possible for end users.
Ajayi, O.+4 more
core +4 more sources
Toward Zero‐Excess Alkali Metal Batteries: Bridging Experimental and Computational Insights
This review explores zero‐excess alkali metal batteries, highlighting anode–electrolyte interfaces, metal nucleation, dendrite growth, and SEI formation while comparing Li, Na, and K metals. It critically examines electrolyte and separator roles, emphasizing substrate design, electrolyte modifications, interfacial engineering, and solid‐state ...
Pan He+6 more
wiley +1 more source
Building a Secure Scheme for a Trusted Hardware Sharing Environment
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu+5 more
doaj +1 more source
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network
Time Distribution Networks (TDNs) evolve as new technologies occur to ensure more accurate, reliable, and secure timing information. These networks typically exploit several distributed time servers, organized in a master-slave architecture, that ...
Diana Gratiela Berbecaru+5 more
doaj +1 more source