Results 61 to 70 of about 135,847 (312)

VMI-based virtual machine remote attestation scheme

open access: yes网络与信息安全学报, 2018
The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo ...
Wei WANG,Xin JIN, Xingshu CHEN, Xiao LAN
doaj   +3 more sources

Access mechanism of TMP under mobile network

open access: yesTongxin xuebao, 2010
The publication of TCG MTM standard ensured the safety of mobile terminal and its promotion results in the changes of communication on mobile terminals.An access mechanism to trusted mobile platform(mobile terminals with MTM chips,TMP) was proposed on ...
WU Zhen-qiang, ZHOU Yan-wei, QIAO Zi-rui
doaj   +2 more sources

A Framework for Constructing a Secure Domain of Sensor Nodes

open access: yesSensors, 2019
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its ...
Janusz Furtak   +2 more
doaj   +1 more source

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

Charge Transport and Carrier Polarity Tuning by Electrolyte Gating in Nickel Benzenehexathiol Coordination Nanosheets

open access: yesAdvanced Materials, EarlyView.
This work reveals that charge transport in nickel benzenehexathiol coordination nanosheets is governed by variable‐range hopping reflecting structural disorder. Electrolyte gating induces a switch in dominant carrier polarity from p‐type to n‐type and leads to an improvement in thermoelectric performance.
Tian Wu   +8 more
wiley   +1 more source

A mobile and portable trusted computing platform

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational ...
Nepal Surya   +3 more
doaj  

A Shibboleth-protected privilege management infrastructure for e-science education [PDF]

open access: yes, 2006
Simplifying access to and usage of large scale compute resources via the grid is of critical importance to encourage the uptake of e-research. Security is one aspect that needs to be made as simple as possible for end users.
Ajayi, O.   +4 more
core   +4 more sources

Toward Zero‐Excess Alkali Metal Batteries: Bridging Experimental and Computational Insights

open access: yesAdvanced Materials, EarlyView.
This review explores zero‐excess alkali metal batteries, highlighting anode–electrolyte interfaces, metal nucleation, dendrite growth, and SEI formation while comparing Li, Na, and K metals. It critically examines electrolyte and separator roles, emphasizing substrate design, electrolyte modifications, interfacial engineering, and solid‐state ...
Pan He   +6 more
wiley   +1 more source

Building a Secure Scheme for a Trusted Hardware Sharing Environment

open access: yesIEEE Access, 2017
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu   +5 more
doaj   +1 more source

Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network

open access: yesIEEE Access, 2023
Time Distribution Networks (TDNs) evolve as new technologies occur to ensure more accurate, reliable, and secure timing information. These networks typically exploit several distributed time servers, organized in a master-slave architecture, that ...
Diana Gratiela Berbecaru   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy