Works matching Trusted Platform Module (TPM)
Results: 53
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2171, doi. 10.1002/sec.1162
- By:
- Publication type:
- Article
A FRAMEWORK FOR SECURE WEB BROWSING, USING TRUSTED PLATFORM MODULE (TPM).
- Published in:
- Journal of Information System Security, 2021, v. 17, n. 3, p. 163
- By:
- Publication type:
- Article
Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 9, p. 491, doi. 10.3390/info14090491
- By:
- Publication type:
- Article
A Secure Robust and Privacy Enhanced Mobile Healthcare Framework.
- Published in:
- International Journal of Web Services Research, 2018, v. 15, n. 3, p. 61, doi. 10.4018/IJWSR.2018070104
- By:
- Publication type:
- Article
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2802, doi. 10.1002/sec.1193
- By:
- Publication type:
- Article
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 2, p. 2223, doi. 10.32604/cmc.2022.028382
- By:
- Publication type:
- Article
MODIFIED SECURE STORAGE AND ERASURE (SSE) PROTOCOL FOR DELETING SECRET DATA.
- Published in:
- i-Manager's Journal On Cloud Computing, 2021, v. 8, n. 2, p. 18, doi. 10.26634/jcc.8.2.15218
- By:
- Publication type:
- Article
Research on trusted boot technology based on collaborative virtualization system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 10, p. 3125, doi. 10.3969/j.issn.1001-3695.2014.10.060
- By:
- Publication type:
- Article
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
- Published in:
- Electronic Commerce Research, 2019, v. 19, n. 3, p. 689, doi. 10.1007/s10660-019-09366-3
- By:
- Publication type:
- Article
Confidential computing and related technologies: a critical review.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00144-1
- By:
- Publication type:
- Article
Perceptrons Helping to Secure VANETs.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 181
- By:
- Publication type:
- Article
Rootkit Guard (RG) - An Architecture for Rootkit Resistant File-System Implementation Based on TPM.
- Published in:
- Pertanika Journal of Science & Technology, 2013, v. 21, n. 2, p. 507
- By:
- Publication type:
- Article
Privacy-aware access control for message exchange in vehicular ad hoc networks.
- Published in:
- Telecommunication Systems, 2015, v. 58, n. 4, p. 349, doi. 10.1007/s11235-014-9881-8
- By:
- Publication type:
- Article
Verbesserte Sicherheit für eingebettete Systeme.
- Published in:
- Elektronik Industrie, 2025, p. 57
- Publication type:
- Article
虚拟平台环境中一种新的可信证书链扩展方法.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2018, v. 39, n. 6, p. 133, doi. 10.11959/j.issn.1000-436x.2018090
- By:
- Publication type:
- Article
Single Attestation Image for a Trusted and Scalable Grid.
- Published in:
- International Journal of Grid & High Performance Computing, 2010, v. 2, n. 1, p. 21, doi. 10.4018/jghpc.2010092802
- By:
- Publication type:
- Article
Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 4, p. 913, doi. 10.3390/sym15040913
- By:
- Publication type:
- Article
Network Attack Chain Security Model Construction Based On Attack Framework.
- Published in:
- Journal of Electrical Systems, 2023, v. 19, n. 4, p. 116
- By:
- Publication type:
- Article
RTTV: a dynamic CFI measurement tool based on TPM.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 438, doi. 10.1049/iet-ifs.2017.0459
- By:
- Publication type:
- Article
Multi-Tenant-Oriented Trusted Container Hierarchical Key Management Method.
- Published in:
- Journal of Computer Engineering & Applications, 2024, v. 60, n. 12, p. 283, doi. 10.3778/j.issn.1002-8331.2302-0143
- By:
- Publication type:
- Article
Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/8859618
- By:
- Publication type:
- Article
Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations.
- Published in:
- Energies (19961073), 2023, v. 16, n. 11, p. 4285, doi. 10.3390/en16114285
- By:
- Publication type:
- Article
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
- Published in:
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 921, doi. 10.1007/s00779-012-0543-0
- By:
- Publication type:
- Article
A Comprehensive Survey of TPM for Defense Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2024, v. 18, n. 7, p. 1953, doi. 10.3837/tiis.2024.07.012
- By:
- Publication type:
- Article
A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 1, p. 436, doi. 10.3837/tiis.2018.01.021
- By:
- Publication type:
- Article
Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 9, p. 2405, doi. 10.3837/tiis.2012.09.025
- By:
- Publication type:
- Article
ASM: Augmented Security Module for Commercial IoT Devices.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2024, v. 31, n. 1, p. 48, doi. 10.17559/TV-20230608000709
- By:
- Publication type:
- Article
ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 24, p. 8034, doi. 10.3390/s24248034
- By:
- Publication type:
- Article
Research of a new security mechanism on energy internet.
- Published in:
- Indian Journal of Power & River Valley Development, 2021, v. 71, n. 7/8, p. 123
- By:
- Publication type:
- Article
Security analysis of SM2 key exchange protocol in TPM2.0.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 3, p. 383, doi. 10.1002/sec.987
- By:
- Publication type:
- Article
Windows 11 and the dawn of the TPM - a forensically sound way to beat it.
- Published in:
- Australian Journal of Forensic Sciences, 2024, v. 56, n. 1, p. 123, doi. 10.1080/00450618.2024.2324752
- By:
- Publication type:
- Article
Windows 11 and the dawn of the TPM - a forensically sound way to beat it.
- Published in:
- Australian Journal of Forensic Sciences, 2024, v. 56, n. 1, p. 123, doi. 10.1080/00450618.2024.2324752
- By:
- Publication type:
- Article
A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 2, p. 41, doi. 10.3390/drones6020041
- By:
- Publication type:
- Article
Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 15, p. 2978, doi. 10.3390/electronics13152978
- By:
- Publication type:
- Article
An Automotive Reference Testbed with Trusted Security Services.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 4, p. 888, doi. 10.3390/electronics12040888
- By:
- Publication type:
- Article
微处理器内安全子系统的安全增强技术.
- Published in:
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2021, v. 43, n. 8, p. 1353, doi. 10.3969/j.issn.1007-130X.2021.08.003
- By:
- Publication type:
- Article
A cluster of patterns for trusted computing.
- Published in:
- International Journal of Information Security, 2025, v. 24, n. 1, p. 1, doi. 10.1007/s10207-024-00972-3
- By:
- Publication type:
- Article
Improving the security of direct anonymous attestation under host corruptions.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 4, p. 475, doi. 10.1007/s10207-020-00507-6
- By:
- Publication type:
- Article
Analysis of two authorization protocols using Colored Petri Nets.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 3, p. 221, doi. 10.1007/s10207-014-0243-z
- By:
- Publication type:
- Article
Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
- Published in:
- Telecommunication Systems, 2020, v. 74, n. 3, p. 379, doi. 10.1007/s11235-020-00656-y
- By:
- Publication type:
- Article
A Novel Trusted Software Base for Commercial Android Devices Using Secure TF Card.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6731277
- By:
- Publication type:
- Article
Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/5569331
- By:
- Publication type:
- Article
Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility.
- Published in:
- Journal of Advanced Transportation, 2021, p. 1, doi. 10.1155/2021/5569331
- By:
- Publication type:
- Article
RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 13, p. 5060, doi. 10.3390/s22135060
- By:
- Publication type:
- Article
Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 17, p. 5012, doi. 10.3390/s20175012
- By:
- Publication type:
- Article
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 19, p. 4191, doi. 10.3390/s19194191
- By:
- Publication type:
- Article
A Framework for Constructing a Secure Domain of Sensor Nodes.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 12, p. 2797, doi. 10.3390/s19122797
- By:
- Publication type:
- Article
An approach to introducing locality in remote attestation using near field communications.
- Published in:
- Journal of Supercomputing, 2011, v. 55, n. 2, p. 207, doi. 10.1007/s11227-010-0407-1
- By:
- Publication type:
- Article
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic.
- Published in:
- Connection Science, 2021, v. 33, n. 3, p. 532, doi. 10.1080/09540091.2020.1854180
- By:
- Publication type:
- Article
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 345, doi. 10.1109/TDSC.2011.63
- By:
- Publication type:
- Article